Cyber Defense Mechanisms
Security, Privacy, and Challenges
Herausgeber: Cuong, Nguyen Ha Huy; Saini, Dinesh Kumar; Kumar, Gautam
Cyber Defense Mechanisms
Security, Privacy, and Challenges
Herausgeber: Cuong, Nguyen Ha Huy; Saini, Dinesh Kumar; Kumar, Gautam
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
Andere Kunden interessierten sich auch für
- Cyber Defense Mechanisms255,99 €
- Big Data and Edge Intelligence for Enhanced Cyber Defense157,99 €
- Huanhuan YuanAttack-and-Defense Games for Control Systems222,99 €
- Utilizing Generative AI for Cyber Defense Strategies457,99 €
- Yuri DiogenesCybersecurity - Attack and Defense Strategies57,99 €
- Yuri DiogenesCybersecurity - Attack and Defense Strategies - Second Edition89,99 €
- Utilizing Generative AI for Cyber Defense Strategies345,99 €
-
-
-
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 232
- Erscheinungstermin: 4. Oktober 2024
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 360g
- ISBN-13: 9780367540968
- ISBN-10: 0367540967
- Artikelnr.: 71688334
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
- Verlag: CRC Press
- Seitenzahl: 232
- Erscheinungstermin: 4. Oktober 2024
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 360g
- ISBN-13: 9780367540968
- ISBN-10: 0367540967
- Artikelnr.: 71688334
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
Gautam Kumar, PhD, is working with Dept. of Computer Science and Engineering, CMR Engineering College, Hyderabad. He received his PhD degree in Computer Science and Engineering from Jaypee University of Information Technology, Himachal Pradesh, India. He did his M.Tech from Rajasthan Technical University and B.E. from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Madhya Pradesh. He is having a professional teaching experience of more than of 14+ years in the various institutions Institute of Engineering and Technology, Rajasthan, ICFAI University, Hyderabad, and Narsimha Reddy Engineering College, Hyderabad, India. He has taught more than of 20 Computer Science & Engineering subjects. His research interests are in the field of Cryptography, Information Security, Algorithms Designs and Analysis. He has published more than 35 research journals and conferences papers of repute in Science Citation Indexed and Scopus Indexed Journals. Till date he is having two patents. He is a Reviewer of (i) Security and Communication Networks, John Wiley & Sons[Indexed in Science Citation Indexed, SCOPUS], (ii) The Computer Journal, Oxford Academic [Indexed in Science Citation Indexed, SCOPUS], & many Reputes of IEEE/ACM International Conferences. In his credit, he is has handled various responsibility such as Institute's Innovation Council, President from Institute, and Smart-India Hackthon, Convenor (MHRD). Dinesh Kumar Saini is an Associate Professor working with Faculty of Computing, Information Technology, Sohar University, Sultanate of Oman. He is having experience of more than 18+ years in academic. He has handled various administrative posts. He has published more than 120 research journals and conferences papers of repute. He is also part of the editorial and advisory board of several journals and has been editor of several special issues in books and journals. He has supervised various academic R&D projects. His area of expertise in Computer Science and Engineering, Information Technology, Software Systems, Business Administration and Human Resource Management. Nguyen Ha Huy Cuong, PhD, working The University of Danang- College of Information Technology. Ha Huy Cuong Nguyen obtained his doctorate in Computer Science / Resource Allocation Cloud Computing in 2017 from the University of Da Nang. He has published over 30 research papers. His main research interests include the resource allocation, detection, prevention, and avoidance of cloud computing and distributed systems. He serves as a technical committee program member, track chair, session chair and reviewer of many international conferences and journals. He is a guest editor journal "International Journal of Information Technology Project Management (IJITPM)" with Special Issue On: Recent Works on Management and Technological Advancement. He is editor/reviewer for Machine Learning & Networked Collaborative Engineering Journal, Asian Journal For Convergence In Technology (AJCT) Journal, and some international conferences.
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.
Chapter 2 Defense against the Survivability to Network Strategies
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security
Systems
Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor
Networks
Chapter 5 Security Issues in IoT Networks
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
Chapter 7 Design Principles and Privacy in Cloud Computing
Chapter 8 Big Data Analysis on Smart Tools and Techniques
Chapter 9 Lightweight Security Protocols for Blockchain Technology
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer
Network Using Pre-Quarantine
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as
Human-like Robotic Player for Fighting Game Using Rule-Based Method
Chapter 13 Web-Based Smart Agriculture System
Index.