Skip to content

Defense in Depth

Hewa Majeed Zangana

Modern Cybersecurity Strategies and Evolving Threats

Barcode 9781394340729
Hardback

Original price £106.53 - Original price £106.53
Original price
£106.53
£106.53 - £106.53
Current price £106.53

Click here to join our rewards scheme and earn points on this purchase!

Availability:
Low Stock
FREE shipping

Release Date: 20/11/2025

Label: Wiley-IEEE Press
Contributors: Hewa Majeed Zangana (Edited by)
Language: English
Publisher: John Wiley & Sons Inc

Modern Cybersecurity Strategies and Evolving Threats

Up-to-date reference on the evolving landscape of cybersecurity, focusing on strategies that integrate AI, blockchain, and human factors

Defense in Depth delivers a comprehensive guide to the rapidly developing field of digital threats and defenses. This book examines how defense-in-depth approaches integrate multiple layers of security to protect against a wide range of threats; how AI technologies are being utilized for threat detection, response, and prediction; and how blockchain technology can be leveraged to enhance security measures, particularly in ensuring data integrity and securing transactions. Case studies of significant cyberattacks are included throughout the text to elucidate key concepts.

The book discusses additional topics such as:

  • The critical importance of cybersecurity in today’s interconnected world and the historical evolution of cyber threats, highlighting modern attack vectors
  • Core principles of defense, detailing layered security measures across networks, applications, data, and endpoints
  • Human factors, often the weakest link in cybersecurity, with strategies for mitigating risks
  • Machine learning and neural networks and their usage in AI-driven security solutions across finance, healthcare, and government
  • Advanced defense techniques, practical applications, and future directions in cybersecurity

Defense in Depth is an essential reference on the state of the art in the field for cybersecurity professionals, IT practitioners, and researchers. It is also an excellent learning aid for advanced students in cybersecurity, particularly those in graduate programs.