Sign in to your account or register new one to have full control over your orders, receive bonuses and more.
New customer? Register
Subtotal: 0.00
Total Items In Cart:
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge).