Cyberology
An Optimized Approach to the Cyber-World
Herausgeber: Kaleem, Adil; Ahmed, Tasneem; Shukla, Saurabh; Husain, Mohd. Shahid; Faisal, Mohammad; Sadia, Halima
Cyberology
An Optimized Approach to the Cyber-World
Herausgeber: Kaleem, Adil; Ahmed, Tasneem; Shukla, Saurabh; Husain, Mohd. Shahid; Faisal, Mohammad; Sadia, Halima
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cyber security, including cybercrime laws, cyberbullying, and emerging technologies.
Andere Kunden interessierten sich auch für
- Challenges in Information, Communication and Computing Technology314,99 €
- Challenges in Information, Communication and Computing Technology314,99 €
- Junlong ZhouFusion and Integration of Clouds, Edges, and Devices90,99 €
- Chris RodaEssential Programming for the Technical Artist185,99 €
- Sufyan bin UzayrRuby164,99 €
- Smart Cities146,99 €
- Jitendra KumarMachine Learning for Cloud Management199,99 €
-
-
-
This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cyber security, including cybercrime laws, cyberbullying, and emerging technologies.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 424
- Erscheinungstermin: 27. März 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032526683
- ISBN-10: 1032526688
- Artikelnr.: 71848457
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 424
- Erscheinungstermin: 27. März 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032526683
- ISBN-10: 1032526688
- Artikelnr.: 71848457
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Dr. Mohd Shahid Husain Dr. Mohd. Shahid Husain is a Research Professional and Faculty member with fourteen years of teaching & research experience. He is currently working as an Assistant Professor in the College of Computing and Information Sciences, University of Technology & Applied Sciences, Oman. He obtained his M.Tech. in Information Technology (spl: Intelligent System) from the Indian Institute of Information Technology, Allahabad (www.iiita.ac.in), India. He received his Ph.D. in Computer Science & Engineering from Integral University, Lucknow (www.iul.ac.in), India. His area of interest includes Artificial Intelligence, Information Retrieval, Natural Language Processing, Data Mining, Web mining, Data Analytics, Sentiment Analysis, and Computer Networks & Security. Dr. Mohd. Shahid Husain has published 6 books, 15 book chapters & more than 30 research papers in journals/conferences of international repute. He was involved with many sponsored projects as PI/Co-PI. Currently, he is working on 2 funded projects submitted to TRC (The Research Council), Oman. He is also contributing his knowledge and experience as an invited speaker, doctorial committee member, session chair, member of the editorial board/advisory committee, and TPC in various international journals/conferences of repute. Dr. Mohd Shahid Husain is an active member of different professional bodies including IEEE young professionals, IEEE-TCII, ISTE, CSTA, and IACSIT. Dr. Mohd Shahid Husain has qualified UGC-NET (National Eligibility Test) in June 2014 and GATE (Graduate Aptitude Test in Engineering) in 2008. He obtained two specialization certificates in python & Applied Data Science from the University of Michigan in 2020. Dr. Mohammad Faisal Dr. Mohammad Faisal is currently working as Professor and Head, Department of Computer Application, Integral University, Lucknow, Uttar Pradesh, India. He has more than 17 years of teaching and research experience teaching courses in both undergraduate and postgraduate levels. His areas of interest are Software Engineering and Cyber Security. He has One Patent, Two authored and six edited books on contemporary trends in computer application. He has published quality research papers in journals and national and international conferences of repute. He has also been contributing his knowledge and experience as a member of the Editorial Board/Advisory committee and TPC in various international journals/ conferences of repute. He is also an active member of various professional bodies such as IAENG, CSTA, ISOC-USA, EASST, HPC, ISTE, IAENG, and UACEE. Dr. Halima Sadia Dr. Halima Sadia is an Associate Professor in the Department of Computer Science & Engineering, at Integral University, Lucknow. She has over 17 years of teaching and research experience. She has completed her Ph.D. in Computer Science & Engineering from Abdul Kalam Technical University, Lucknow, India. Her research interests include requirement engineering, cyber security, and blockchain in healthcare sector. She has published multiple research articles in Scopus indexed journals, national, and international conferences of repute. Dr. Halima Sadia has also authored 3 books in the field of Computer Science & Engineering. She is passionate about mentoring the next generation of computer scientists and engineers and is contributing her knowledge and experience as a member of the editorial board, advisory committee, and technical program committee. She is an active member of different professional bodies including ISTE, IAENG, UACEE, CSTA, ISOC-USA, EASST, HPC-Houston. Dr. Tasneem Ahmed Dr. Tasneem Ahmed received his PhD degree in 2016 in Image Processing from Indian Institute of Technology (IIT) Roorkee, India. Currently, he is working as an Associate Professor in the Department of Computer Application at Integral University Lucknow, India. His research interests include digital image processing and computer vision, optical and microwave satellite image processing, image classification, data fusion, time series analysis, and SAR data analysis for land cover classification. He has edited 03 Books, published 16 research papers in various SCIE and Scopus indexed journals and 19 Conference papers in various National and International Conferences/Seminars/Symposium and 14 Book Chapters. He is actively involved in R&D projects, PhD supervision, organizing international conferences & events as a TPC member, Editorial Board Member, and Reviewer of various international journals, and involved in other key administrative tasks in the university. Dr. Saurabh Shukla Dr Saurabh Shukla is working as Assistant Professor, and Head of Department, Computer Science at the Indian Institute of Information Technology Lucknow (IIITL). He has received his Post Doc from University of Galway, Ireland in the Unit of Semantic Web, Data Science Institute (DSI), Insight SFI Centre of Data Analytics. He obtained his PhD from Universiti Teknologi PETRONAS (UTP), Malaysia in the research area of healthcare Internet-of-Things (IoT). He was awarded M. Tech from the Indian Institute of Information Technology (IIIT), Allahabad, India in 2010 in the research area of intelligent system. He had completed B. Tech from Dr A.P.J Abdul Kalam Technical University, Uttar-Pradesh (U.P), Lucknow, India in 2008. His research interests are Healthcare Internet-of-Things, Fog Computing (FC), cloud computing, machine learning, and the blockchain mechanism. He is currently working on Cooperative Energy Trading System (CENTS) project for an efficient Peer-2-Peer energy trading system in a Smart Grid (SG) network. He has academic experience of more than 7 years and published 1 book, 6 book chapters and around 20 papers in various international journals and conferences. In recognition of his articles in Q1/Q2 journals and quality publications he has received many awards and certificates. He received research grants like UTP-Hitachi Collaborative Research, Long Term Research Grant Scheme 2018, UTP-PAF KIET International Collaborative Research Funding (ICRF) 2019 and Collaborative Research Funding (CRF) 2019. Adil Kaleem He is an experienced Industry Consultant on Cloud, Big Data, ETL & Data Warehousing, in varying sectors like Telco, retail, banking, not for profit and education. Currently he is working as Cloud Delivery Technical Architect in NCS, Australia. His experience constitutes across broad work areas from DevOps to Design & Architecting solutions. Having lived through the Hadoop era and now experiencing Cloud in market, he worked through some of the most innovative companies & teams like TCS, Uniting, Teradata Australia Pty Ltd, Teradata India Pvt. LTD, IBM India Pvt Ltd paving their way in incorporating new techs in their businesses.
1. Changing Paradigm in AI Application and Its Impact on Cybercrime: Review
of Major Global Events 2. Transformative Impact: Social Robots Redefining
Industries and Services 3. Strategies for Cyber-Resilience: Combatting
Advanced Persistent Threats in the Digital Age 4. Unveiling the Digital
Trails: A Survey of Contemporary Digital Forensics Tools and Techniques 5.
Issues and Challenges in Emerging Cyber Forensics and Traditional Cyber
Forensics Methods 6. Optimized Approaches for Cyber Forensics Tools
Applications Case Studies 7. A Study of Cyber Threats and Security
Frameworks in Cloud Computing 8. Cyberthreats in Cloud Computing Unveiling
Vulnerabilities and How to Strengthen the Defence 9. A Comprehensive
Analysis of Vulnerabilities and Cybersecurity Issues for Digital
Agriculture and Food Industry 10. Unveiling critical success factor of the
implementation of Zero Trust Cybersecurity in Food industry from a stage of
change perspective 11. Understanding and Mitigating Cyber Threats in smart
Fruit Crops Safety: An Analysis of Vulnerability and Best Practices for
Securing Agricultural Systems 12. Cyber Resilience in a Digital World:
Securing Healthcare, Agriculture, and Food Industry Against Emerging
Threats 13. Cyberbullying - Understanding, Preventing, and Addressing
Online Harassment 14. The Perils of Cyberbullying on Social Media:
Detection and Prevention with Artificial Intelligence 15. Cybersecurity
Challenges and Countermeasures in Smart Cities for Sustainable Environment
Development: A Comprehensive Analysis of Threats and Resilience Strategies
16. Cyber Risk Management in IoT Security Technologies 17. Landscape of
Cyber Terrorism on Internet and AI Powered Countermeasures 18. Hybrid
secure clustered nature-inspired decision support system for secure data
communication in cyberspace 19. Transforming Network Protection Via Open
Innovation Strategies 20. Emerging Role of Digital Library in Evaluating
Copyright Regulations
of Major Global Events 2. Transformative Impact: Social Robots Redefining
Industries and Services 3. Strategies for Cyber-Resilience: Combatting
Advanced Persistent Threats in the Digital Age 4. Unveiling the Digital
Trails: A Survey of Contemporary Digital Forensics Tools and Techniques 5.
Issues and Challenges in Emerging Cyber Forensics and Traditional Cyber
Forensics Methods 6. Optimized Approaches for Cyber Forensics Tools
Applications Case Studies 7. A Study of Cyber Threats and Security
Frameworks in Cloud Computing 8. Cyberthreats in Cloud Computing Unveiling
Vulnerabilities and How to Strengthen the Defence 9. A Comprehensive
Analysis of Vulnerabilities and Cybersecurity Issues for Digital
Agriculture and Food Industry 10. Unveiling critical success factor of the
implementation of Zero Trust Cybersecurity in Food industry from a stage of
change perspective 11. Understanding and Mitigating Cyber Threats in smart
Fruit Crops Safety: An Analysis of Vulnerability and Best Practices for
Securing Agricultural Systems 12. Cyber Resilience in a Digital World:
Securing Healthcare, Agriculture, and Food Industry Against Emerging
Threats 13. Cyberbullying - Understanding, Preventing, and Addressing
Online Harassment 14. The Perils of Cyberbullying on Social Media:
Detection and Prevention with Artificial Intelligence 15. Cybersecurity
Challenges and Countermeasures in Smart Cities for Sustainable Environment
Development: A Comprehensive Analysis of Threats and Resilience Strategies
16. Cyber Risk Management in IoT Security Technologies 17. Landscape of
Cyber Terrorism on Internet and AI Powered Countermeasures 18. Hybrid
secure clustered nature-inspired decision support system for secure data
communication in cyberspace 19. Transforming Network Protection Via Open
Innovation Strategies 20. Emerging Role of Digital Library in Evaluating
Copyright Regulations
1. Changing Paradigm in AI Application and Its Impact on Cybercrime: Review
of Major Global Events 2. Transformative Impact: Social Robots Redefining
Industries and Services 3. Strategies for Cyber-Resilience: Combatting
Advanced Persistent Threats in the Digital Age 4. Unveiling the Digital
Trails: A Survey of Contemporary Digital Forensics Tools and Techniques 5.
Issues and Challenges in Emerging Cyber Forensics and Traditional Cyber
Forensics Methods 6. Optimized Approaches for Cyber Forensics Tools
Applications Case Studies 7. A Study of Cyber Threats and Security
Frameworks in Cloud Computing 8. Cyberthreats in Cloud Computing Unveiling
Vulnerabilities and How to Strengthen the Defence 9. A Comprehensive
Analysis of Vulnerabilities and Cybersecurity Issues for Digital
Agriculture and Food Industry 10. Unveiling critical success factor of the
implementation of Zero Trust Cybersecurity in Food industry from a stage of
change perspective 11. Understanding and Mitigating Cyber Threats in smart
Fruit Crops Safety: An Analysis of Vulnerability and Best Practices for
Securing Agricultural Systems 12. Cyber Resilience in a Digital World:
Securing Healthcare, Agriculture, and Food Industry Against Emerging
Threats 13. Cyberbullying - Understanding, Preventing, and Addressing
Online Harassment 14. The Perils of Cyberbullying on Social Media:
Detection and Prevention with Artificial Intelligence 15. Cybersecurity
Challenges and Countermeasures in Smart Cities for Sustainable Environment
Development: A Comprehensive Analysis of Threats and Resilience Strategies
16. Cyber Risk Management in IoT Security Technologies 17. Landscape of
Cyber Terrorism on Internet and AI Powered Countermeasures 18. Hybrid
secure clustered nature-inspired decision support system for secure data
communication in cyberspace 19. Transforming Network Protection Via Open
Innovation Strategies 20. Emerging Role of Digital Library in Evaluating
Copyright Regulations
of Major Global Events 2. Transformative Impact: Social Robots Redefining
Industries and Services 3. Strategies for Cyber-Resilience: Combatting
Advanced Persistent Threats in the Digital Age 4. Unveiling the Digital
Trails: A Survey of Contemporary Digital Forensics Tools and Techniques 5.
Issues and Challenges in Emerging Cyber Forensics and Traditional Cyber
Forensics Methods 6. Optimized Approaches for Cyber Forensics Tools
Applications Case Studies 7. A Study of Cyber Threats and Security
Frameworks in Cloud Computing 8. Cyberthreats in Cloud Computing Unveiling
Vulnerabilities and How to Strengthen the Defence 9. A Comprehensive
Analysis of Vulnerabilities and Cybersecurity Issues for Digital
Agriculture and Food Industry 10. Unveiling critical success factor of the
implementation of Zero Trust Cybersecurity in Food industry from a stage of
change perspective 11. Understanding and Mitigating Cyber Threats in smart
Fruit Crops Safety: An Analysis of Vulnerability and Best Practices for
Securing Agricultural Systems 12. Cyber Resilience in a Digital World:
Securing Healthcare, Agriculture, and Food Industry Against Emerging
Threats 13. Cyberbullying - Understanding, Preventing, and Addressing
Online Harassment 14. The Perils of Cyberbullying on Social Media:
Detection and Prevention with Artificial Intelligence 15. Cybersecurity
Challenges and Countermeasures in Smart Cities for Sustainable Environment
Development: A Comprehensive Analysis of Threats and Resilience Strategies
16. Cyber Risk Management in IoT Security Technologies 17. Landscape of
Cyber Terrorism on Internet and AI Powered Countermeasures 18. Hybrid
secure clustered nature-inspired decision support system for secure data
communication in cyberspace 19. Transforming Network Protection Via Open
Innovation Strategies 20. Emerging Role of Digital Library in Evaluating
Copyright Regulations