Agile Security in the Digital Era
Challenges and Cybersecurity Trends
Herausgeber: Nassereddine, Bouchaib; Khourdifi, Youness; Zaydi, Mounia; Zhang, Justin
Agile Security in the Digital Era
Challenges and Cybersecurity Trends
Herausgeber: Nassereddine, Bouchaib; Khourdifi, Youness; Zaydi, Mounia; Zhang, Justin
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Trends" emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
Andere Kunden interessierten sich auch für
- Ravindra DasA Reference Manual for Data Privacy Laws and Cyber Frameworks156,99 €
- Claudia LanzaRansomware Analysis159,99 €
- Nick TilleyBetter Crime Prevention168,99 €
- Yan YanProtecting Location Privacy in the Era of Big Data91,99 €
- Andrew JenkinsonStuxnet to Sunburst157,99 €
- Eleanor E ThompsonThe Insider Threat95,99 €
- Arun SoniThe Cybersecurity Self-Help Guide156,99 €
-
-
-
In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Trends" emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 228
- Erscheinungstermin: 30. Dezember 2024
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 610g
- ISBN-13: 9781032757926
- ISBN-10: 1032757922
- Artikelnr.: 71185369
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 228
- Erscheinungstermin: 30. Dezember 2024
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 610g
- ISBN-13: 9781032757926
- ISBN-10: 1032757922
- Artikelnr.: 71185369
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Prof. Mounia ZAYDI is an associate professor of cybersecurity at JUNIA ISEN Engineering School and a member of the Catholic University's Interdisciplinary Laboratory of Transitions in Lille, France. She is a member of IEEE and the International Association of Engineers (IAENG). Dr. Zaydi has made significant contributions in the fields of information security and privacy, IT governance, risk management, and the application of Artificial Intelligence to IT changes, incidents, and agility. Her research interests include information security and privacy, the Internet of Things, network security, information systems, IT governance, and intrusion detection. She has published over 20 papers, including book chapters, in international journals, conferences, and workshops. Dr. Zaydi has also served and continues to serve on executive and technical program committees, as well as a reviewer for numerous international conferences and journals. Prof. Youness KHOURDIFI, he is a doctor in computer science and a full-time assistant professor in the Polydisciplinary Faculty - Khouribga of the University Sultan Moulay Slimane - Béni Mellal in Morocco, he is assigned to the Department of Mathematics and Computer Science in the Laboratory of Material Sciences, Mathematics and Environment, he is a member of IEEE and the International Association of Engineers (IAENG), he works in the fields of Artificial Intelligence, Big Data, E-health, Database, information security and privacy, Internet of things security, Data Migration, Data Classification, Data Prediction, Data Optimisation, Machine Learning, FinTech, internet of things, Deep learning. Prof. Bouchaib Nassereddine is an associate Professor of Computer Science at the Faculty of Sciences and Technology and also serves as the Director of the Digitalization Department at Hassan 1st University in Morocco. He is responsible for overseeing the Master of Science and Technology program in "Networks and Systems." He teaches courses on Systems, Networks, Cybersecurity, and Cryptography for the engineering cycle. Professor NASSEREDDINE also supervises PhD students in various fields of IT, including Cybersecurity, Wireless Sensor Networks, Networks Management, IT Service Management, Wireless Mesh Networks, and IT Management. Professor NASSEREDDINE has made notable contributions in the fields of Information Security and Privacy, Risk Management, IT Governance, and Wireless Sensor Networks. His research interests mainly focus on Information Security and Privacy, Networks Security, IT Governance, and Wireless Sensor Networks. He has published more than 50 papers in various mediums, including book chapters, international journals, conferences, and workshops. Additionally, he has served and continues to serve on executive and technical program committees and as a reviewer for several international conferences and journals. Prof. Justin Zhang teaches courses of Information Systems and Business Analytics in the Department of Management at University of North Florida. He received his Ph.D. in Business Administration with a concentration on Management Science and Information Systems from Pennsylvania State University, University Park. His research interests include economics of information systems, knowledge management, electronic business, business process management, information security, and social networking. He is the editor-in-chief of the Journal of Global Information Management, an ABET program evaluator, and an IEEE senior member.
Preface. About the Editors. List of Contributors. Chapter 1: Navigating the
Cybersecurity Maze: Systematic Strategies for Digital Infrastructure
Protection. Chapter2: A new Framework for agile cybersecurity risk
management: Integrating continuous adaptation and real-time threat
intelligence (ACSRM-ICTI). Chapter3: Advancing Cybersecurity: Machine
Learning algorithms for Intrusion Detection Systems. Chapter 4: Agile
security and compliance integration: Enhancing cyber resilience through
dynamic, automated processes. Chapter 5: DevSecOps for Agile Web
Application Security. Chapter 6: Forecasting Moroccan Stock Market using
deep learning approaches. Chapter 7: Penetration Testing in Agile
Cybersecurity Environments. Chapter 8: A comprehensive review of artificial
intelligence techniques for timely and accurate prediction of Down
syndrome. Chapter 9: Blockchain Technology in Healthcare: Improving
Security, Privacy, and Secure Transactions in Patient-Centered Systems.
Index.
Cybersecurity Maze: Systematic Strategies for Digital Infrastructure
Protection. Chapter2: A new Framework for agile cybersecurity risk
management: Integrating continuous adaptation and real-time threat
intelligence (ACSRM-ICTI). Chapter3: Advancing Cybersecurity: Machine
Learning algorithms for Intrusion Detection Systems. Chapter 4: Agile
security and compliance integration: Enhancing cyber resilience through
dynamic, automated processes. Chapter 5: DevSecOps for Agile Web
Application Security. Chapter 6: Forecasting Moroccan Stock Market using
deep learning approaches. Chapter 7: Penetration Testing in Agile
Cybersecurity Environments. Chapter 8: A comprehensive review of artificial
intelligence techniques for timely and accurate prediction of Down
syndrome. Chapter 9: Blockchain Technology in Healthcare: Improving
Security, Privacy, and Secure Transactions in Patient-Centered Systems.
Index.
Preface. About the Editors. List of Contributors. Chapter 1: Navigating the
Cybersecurity Maze: Systematic Strategies for Digital Infrastructure
Protection. Chapter2: A new Framework for agile cybersecurity risk
management: Integrating continuous adaptation and real-time threat
intelligence (ACSRM-ICTI). Chapter3: Advancing Cybersecurity: Machine
Learning algorithms for Intrusion Detection Systems. Chapter 4: Agile
security and compliance integration: Enhancing cyber resilience through
dynamic, automated processes. Chapter 5: DevSecOps for Agile Web
Application Security. Chapter 6: Forecasting Moroccan Stock Market using
deep learning approaches. Chapter 7: Penetration Testing in Agile
Cybersecurity Environments. Chapter 8: A comprehensive review of artificial
intelligence techniques for timely and accurate prediction of Down
syndrome. Chapter 9: Blockchain Technology in Healthcare: Improving
Security, Privacy, and Secure Transactions in Patient-Centered Systems.
Index.
Cybersecurity Maze: Systematic Strategies for Digital Infrastructure
Protection. Chapter2: A new Framework for agile cybersecurity risk
management: Integrating continuous adaptation and real-time threat
intelligence (ACSRM-ICTI). Chapter3: Advancing Cybersecurity: Machine
Learning algorithms for Intrusion Detection Systems. Chapter 4: Agile
security and compliance integration: Enhancing cyber resilience through
dynamic, automated processes. Chapter 5: DevSecOps for Agile Web
Application Security. Chapter 6: Forecasting Moroccan Stock Market using
deep learning approaches. Chapter 7: Penetration Testing in Agile
Cybersecurity Environments. Chapter 8: A comprehensive review of artificial
intelligence techniques for timely and accurate prediction of Down
syndrome. Chapter 9: Blockchain Technology in Healthcare: Improving
Security, Privacy, and Secure Transactions in Patient-Centered Systems.
Index.