Browse Results

Showing 80,501 through 80,525 of 85,158 results

Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability: The PAAMS Collection (Advances in Intelligent Systems and Computing #372)

by Javier Bajo María N. Moreno Philippe Mathieu Amparo Alonso-Betanzos Vicente Botti Andrew Campbell Antonio Fernández-Caballero Josefa Z. Hernández María D. Jiménez-López Vicente Julián

This volume presents the papers that have been accepted for the 2015 special sessions of the 13th International Conference on Practical Applications of Agents and Multi-Agent Systems, held at University of Salamanca, Spain, at 3rd-5th June, 2015: Agents Behaviours and Artificial Markets (ABAM); Agents and Mobile Devices (AM); Multi-Agent Systems and Ambient Intelligence (MASMAI); Web Mining and Recommender systems (WebMiRes); Learning, Agents and Formal Languages (LAFLang); Agent-based Modeling of Sustainable Behavior and Green Economies (AMSBGE); Emotional Software Agents (SSESA) and Intelligent Educational Systems (SSIES). The volume also includes the paper accepted for the Doctoral Consortium in PAAMS 2015.PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems.

Trends in Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection: The Paams Collection (Advances in Intelligent Systems and Computing #293)

by Javier Bajo Perez Alfonso Ortega Emmanuel Adam Sebastian Ahrndt Andrew Campbell Juan M. Corchado Vicente Julián Philippe Mathieu María N. Moreno Elena M. Navarro

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems.This volume presents the papers that have been accepted for the 2014 special sessions: Agents Behaviours and Artificial Markets (ABAM), Agents and Mobile Devices (AM), Bio-Inspired and Multi-Agents Systems: Applications to Languages (Bio MAS), Multi-Agent Systems and Ambient Intelligence (MASMAI), Self-Explaining Agents (SEA), Web Mining and Recommender systems (Web MiRes) and Intelligent Educational Systems (SSIES).

Trends in Practical Applications of Scalable Multi-Agent Systems, the PAAMS Collection (Advances in Intelligent Systems and Computing #473)

by Fernando De La Prieta Elena M. Navarro María N. Moreno María J. Escalona Rafael Corchuelo Philippe Mathieu Zita Vale Andrew T. Campbell Silvia Rossi Emmanuel Adam María D. Jiménez-López

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2016 in the special sessions: Agents Behaviours and Artificial Markets (ABAM); Advances on Demand Response and Renewable Energy Sources in Agent Based Smart Grids (ADRESS); Agents and Mobile Devices (AM); Agent Methodologies for Intelligent Robotics Applications (AMIRA); Learning, Agents and Formal Languages (LAFLang); Multi-Agent Systems and Ambient Intelligence (MASMAI); Web Mining and Recommender systems (WebMiRes). The volume also includes the paper accepted for the Doctoral Consortium in PAAMS 2016 and Collocated Events.

Trends in Social Network Analysis: Information Propagation, User Behavior Modeling, Forecasting, and Vulnerability Assessment (Lecture Notes in Social Networks)

by Rokia Missaoui Talel Abdessalem Matthieu Latapy

The book collects contributions from experts worldwide addressing recent scholarship in social network analysis such as influence spread, link prediction, dynamic network biclustering, and delurking. It covers both new topics and new solutions to known problems. The contributions rely on established methods and techniques in graph theory, machine learning, stochastic modelling, user behavior analysis and natural language processing, just to name a few. This text provides an understanding of using such methods and techniques in order to manage practical problems and situations. Trends in Social Network Analysis: Information Propagation, User Behavior Modelling, Forecasting, and Vulnerability Assessment appeals to students, researchers, and professionals working in the field.

Trends in Software Testing

by Hrushikesha Mohanty J. R. Mohanty Arunkumar Balakrishnan

This book is focused on the advancements in the field of software testing and the innovative practices that the industry is adopting. Considering the widely varied nature of software testing, the book addresses contemporary aspects that are important for both academia and industry. There are dedicated chapters on seamless high-efficiency frameworks, automation on regression testing, software by search, and system evolution management. There are a host of mathematical models that are promising for software quality improvement by model-based testing. There are three chapters addressing this concern. Students and researchers in particular will find these chapters useful for their mathematical strength and rigor. Other topics covered include uncertainty in testing, software security testing, testing as a service, test technical debt (or test debt), disruption caused by digital advancement (social media, cloud computing, mobile application and data analytics), and challenges and benefits of outsourcing. The book will be of interest to students, researchers as well as professionals in the software industry.

Trends in Spatial Analysis and Modelling: Decision-Support and Planning Strategies (Geotechnologies and the Environment #19)

by Martin Behnisch Gotthard Meinel

This book is a collection of original research papers that focus on recent developments in Spatial Analysis and Modelling with direct relevance to settlements and infrastructure. Topics include new types of data (such as simulation data), applications of methods to support decision-making, and investigations of human-environment data in order to recognize significance for structures, functions and processes of attributes. Research incorporated ranges from theoretical through methodological to applied work. It is subdivided into four main parts: the first focusing on the research of settlements and infrastructure, the second studies aspects of Geographic Data Mining, the third presents contributions in the field of Spatial Modelling, System Dynamics and Geosimulation, and the fourth part is dedicated to Multi-Scale Representation and Analysis.The book is valuable to those with a scholarly interest in spatial sciences, urban and spatial planning, as well as anyone interested in spatial analysis and the planning of human settlements and infrastructure. Most of the selected papers were originally presented at the “International Land Use Symposium (ILUS 2015): Trends in Spatial Analysis and Modelling of Settlements and Infrastructure” November 11-13 2015, in Dresden, Germany.

Trends in the Judiciary: Interviews with Judges Across the Globe, Volume Two

by David Lowe Dilip K. Das

The term judicial opinion can be a misnomer as rarely are judges true feelings on legal issues and the work they do made available to the public. Judges are constrained when writing decisions to follow the law and leave personal commentary aside. Through a series of revealing interviews, this book gathers empirical data from judges and justices fr

Trends in Tourist Behavior: New Products and Experiences from Europe (Tourism, Hospitality & Event Management)

by Andrés Artal-Tur Metin Kozak Nazmi Kozak

This book examines both how tourist behavior is being shaped by the new tourism products and segments that are appearing on the European market and how the tourist experience influences post-trip evaluation of destinations and of tourism and hospitality businesses. On this basis, practical implications and recommendations are highlighted that will help destination management organizations to improve the performance of their destinations and particular businesses. The first part of the book explores visitor engagement with a range of new products relating to sports activities and events, city tourism, wine tourism, and youth tourism. In the second part, the focus is primarily on the ways in which tourist experiences influence subsequent trip recommendations, revisiting attitudes, and reviewing behavior on social media. Other topics to be addressed include the factors affecting tourism expenditure on accommodation in World Heritage Cities and the impacts of experience on the motivation of participants in recreational sports tourism events. The book will be of interest for researchers, industry professionals, under- and postgraduate students, and others who wish to learn about new trends in tourist behavior and emerging tourism products.

Trends in Wireless Communication and Information Security: Proceedings of EWCIS 2020 (Lecture Notes in Electrical Engineering #740)

by Mithun Chakraborty Raman Kr. Jha Valentina Emilia Balas Samarendra Nath Sur Debdatta Kandar

This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.

Trends of Artificial Intelligence and Big Data for E-Health (Integrated Science #9)

by Houneida Sakly Kristen Yeom Safwan Halabi Mourad Said Jayne Seekins Moncef Tagina

This book aims to present the impact of Artificial Intelligence (AI) and Big Data in healthcare for medical decision making and data analysis in myriad fields including Radiology, Radiomics, Radiogenomics, Oncology, Pharmacology, COVID-19 prognosis, Cardiac imaging, Neuroradiology, Psychiatry and others. This will include topics such as Artificial Intelligence of Thing (AIOT), Explainable Artificial Intelligence (XAI), Distributed learning, Blockchain of Internet of Things (BIOT), Cybersecurity, and Internet of (Medical) Things (IoTs). Healthcare providers will learn how to leverage Big Data analytics and AI as methodology for accurate analysis based on their clinical data repositories and clinical decision support. The capacity to recognize patterns and transform large amounts of data into usable information for precision medicine assists healthcare professionals in achieving these objectives. Intelligent Health has the potential to monitor patients at risk with underlying conditions and track their progress during therapy. Some of the greatest challenges in using these technologies are based on legal and ethical concerns of using medical data and adequately representing and servicing disparate patient populations. One major potential benefit of this technology is to make health systems more sustainable and standardized. Privacy and data security, establishing protocols, appropriate governance, and improving technologies will be among the crucial priorities for Digital Transformation in Healthcare.

Trends of Data Science and Applications: Theory and Practices (Studies in Computational Intelligence #954)

by Siddharth Swarup Rautaray Phani Pemmaraju Hrushikesha Mohanty

This book includes an extended version of selected papers presented at the 11th Industry Symposium 2021 held during January 7–10, 2021. The book covers contributions ranging from theoretical and foundation research, platforms, methods, applications, and tools in all areas. It provides theory and practices in the area of data science, which add a social, geographical, and temporal dimension to data science research. It also includes application-oriented papers that prepare and use data in discovery research. This book contains chapters from academia as well as practitioners on big data technologies, artificial intelligence, machine learning, deep learning, data representation and visualization, business analytics, healthcare analytics, bioinformatics, etc. This book is helpful for the students, practitioners, researchers as well as industry professional.

Trends on Active Learning Methods and Emerging Learning Technologies (Lecture Notes in Educational Technology)

by Francisco José García-Peñalvo María Luisa Sein-Echaluce Ángel Fidalgo-Blanco

This book uncovers the crucial issues in learning technologies in this digital transformation moment, specifically within the COVID-19 umbrella effects. Remote learning, educational technologies, or distance learning are usually used topics by teachers, students, and researchers because the educational context should be transformed and even reinvented itself drastically. Technologies have been used more intensively in the last year than during the last decade. However, what is the effect of these "new" technologies on the teaching and learning methodologies? Are teachers and students fully digital competent to integrate these technologies in their teaching and learning activities? In this book, the authors claim to go forward that the online teaching conception to replicate the face-to-face teaching through a camera. They propose adapting the active methodologies to the online or hybrid context, which is a challenge that must be corroborated with rigorous educational research.

Trends on Construction in the Digital Era: Proceedings of ISIC 2022 (Lecture Notes in Civil Engineering #306)

by António Gomes Correia Miguel Azenha Paulo J. S. Cruz Paulo Novais Paulo Pereira

These proceedings address the latest developments in the broad area of intelligent construction integrated in the mission of the International Society for Intelligent Construction (ISIC) which aims to promote intelligent construction technologies applications from the survey, design, construction, operation, and maintenance/rehabilitation by adapting to changes of environments and minimizing risks. Its goals are to improve the quality of construction, cost-saving, and safety, exploring fundamental issues related to the application and use of Artificial Intelligence (AI) and Machine Learning techniques and technology. ISIC 2022 is the 3rd ISIC international conference, held in Guimarães, Portugal on September 6–9, 2022, and follows the previous successful instalments of the conference series in China (2019) and USA (2017). It took a holistic approach to integrate civil engineering, construction machinery, electronic sensor technology, survey/testing technologies, information technology/computing, and other related fields in the broad area of intelligent construction. The respective contributions cover the following topics: Artificial Intelligence for Design and the Built Environment, Building Information Modelling (BIM) and Construction Automation and Robotics, Intelligent Construction, Sustainable Construction, and Sustainable and Smart Infrastructures. Given its broad range of coverage, the book will benefit students, educators, researchers and professionals practitioners alike, encouraging these readers to help the intelligent construction community into the digital era and with a vision on societal issues.

Triadic Game Design: Balancing Reality, Meaning and Play

by Casper Harteveld

Many designers, policy makers, teachers, and other practitioners are beginning to understand the usefulness of using digital games beyond entertainment. Games have been developed for teaching, recruiting and to collect data to improve search engines. This book examines the fundamentals of designing any game with a serious purpose and provides a way of thinking on how to design one successfully. The reader will be introduced to a design philosophy called “Triadic Game Design.”; a theory that all games involve three worlds: the worlds of Reality, Meaning, and Play. Each world is affiliated with aspects. A balance needs to be found within and between the three worlds. Such a balance is difficult to achieve, during the design many tensions will arise, forcing designers to make trade-offs. To deal with these tensions and to ensure that the right decisions are made to create a harmonic game, a frame of reference is needed. This is what Triadic Game Design offers.

Triangle Mesh Watermarking and Steganography

by Hang Zhou Kejiang Chen Zehua Ma Feng Wang Weiming Zhang

This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.

Triangulations and Applications (Mathematics and Visualization)

by Øyvind Hjelle Morten Dæhlen

This book will serve as a valuable source of information about triangulations for the graduate student and researcher. With emphasis on computational issues, it presents the basic theory necessary to construct and manipulate triangulations. In particular, the book gives a tour through the theory behind the Delaunay triangulation, including algorithms and software issues. It also discusses various data structures used for the representation of triangulations.

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

by Marcus J. Carey Jennifer Jin

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world’s most noteworthy hackers and influential security specialists.

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world’s most noteworthy hackers and influential security specialists.

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

by Marcus J. Carey Jennifer Jin

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you’re new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

by Marcus J. Carey Jennifer Jin

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you’re new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Refine Search

Showing 80,501 through 80,525 of 85,158 results