Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 2 of 2 matches in All Departments
Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.
Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.
|
You may like...
|