Shilpi Mittal - Böcker
Visar alla böcker från författaren Shilpi Mittal. Handla med fri frakt och snabb leverans.
2 produkter
2 produkter
302 kr
Skickas inom 5-8 vardagar
Identity Security in the AI Era addresses one of the most urgent challenges in cybersecurity today: safeguarding digital identities in a world transformed by artificial intelligence. As enterprises embrace cloud technologies, automation, and data-driven systems, identity has become the new perimeter and the most common target. This book provides a practical framework for understanding how AI is reshaping identity threats and offers actionable strategies to build resilience.Drawing on real-world experience and applied research, the authors explore how to integrate zero-trust principles, responsible AI practices, and adaptive controls into enterprise environments. The text examines key issues, including adversarial AI, supply chain risks, post-quantum readiness, and identity-first security models, translating complex concepts into clear, implementable guidance.Designed for cybersecurity practitioners, IT leaders, and policy professionals, Identity Security in the AI Era delivers insight into how organizations can innovate securely while maintaining compliance and protecting critical infrastructure.
Foundations of Modern Information Security
A Vendor-Neutral Guide to Securing the Cloud, Data, and Identity in the AI Era
Häftad, Engelska, 2026
607 kr
Kommande
In an era defined by cloud computing, AI disruption, and evolving cyber threats, traditional security models are no longer enough. Foundations of Modern Information Security delivers a vendor-neutral, real-world guide to designing and maintaining secure systems that stand up to today’s—and tomorrow’s—challenges. This book bridges the gap between legacy infosec thinking and modern enterprise realities. Covering everything from Zero Trust Architecture and post-quantum cryptography to AI governance and secure cloud design, it equips professionals with the tools to build resilient, adaptable security programs. The methodology is process-centric and rooted in practical implementation, not product marketing. Structured around trusted industry frameworks like NIST, MITRE ATT&CK, and CSA, this guide helps readers align security strategy with compliance, business goals, and operational needs. Whether you're protecting identity, preventing data loss, or planning incident response, you’ll find actionable insights and examples that translate directly to your environment. Whether you're an experienced security architect or a technology leader seeking clarity in a complex landscape, this book offers the foundational knowledge and strategic guidance needed to elevate your security posture—without vendor bias or unnecessary complexity. YOU WILL · Design and implement vendor-neutral Zero Trust Architectures · Build resilient, privacy-respecting identity and data protection programs · Navigate AI-driven threats with quantum-resistant and governance-aware controls · Apply MITRE, NIST, and TOGAF frameworks to real-world cloud and hybrid environments · Establish forensic readiness and proactive incident response capabilities WHO THIS BOOK IS FOR This book is intended for cybersecurity professionals, IT architects, and technical leaders seeking a vendor-neutral, strategic understanding of modern information security. It’s ideal for mid-to-senior level professionals preparing for leadership roles or certifications like CISSP, CCSP, or CISM.