Information Security Handbook
Herausgeber: Humayun, Mamoona; Jhanjhi, Noor Zaman; Hussain, Khalid
Information Security Handbook
Herausgeber: Humayun, Mamoona; Jhanjhi, Noor Zaman; Hussain, Khalid
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts and serves as a manual for industry while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy…mehr
Andere Kunden interessierten sich auch für
- Michael WeyrichIndustrielle Automatisierungs- und Informationstechnik49,99 €
- Kevin WarwickComputer Intensive Methods in Control and Signal Processing74,99 €
- Kevin WarwickComputer Intensive Methods in Control and Signal Processing83,99 €
- Ralf KneuperDatenschutz für Softwareentwicklung und IT59,99 €
- Information Security and Cryptology37,99 €
- Manuela ReißPraxisbuch IT-Dokumentation49,00 €
- IT-Prüfung, Sicherheitsaudit und Datenschutzmodell37,99 €
-
-
-
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts and serves as a manual for industry while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through the IoT ecosystem and implications to the real world and, at the same time, explains the concepts of IoT-related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 272
- Erscheinungstermin: 18. Februar 2022
- Englisch
- Abmessung: 240mm x 161mm x 19mm
- Gewicht: 577g
- ISBN-13: 9780367365721
- ISBN-10: 0367365723
- Artikelnr.: 62607201
- Verlag: CRC Press
- Seitenzahl: 272
- Erscheinungstermin: 18. Februar 2022
- Englisch
- Abmessung: 240mm x 161mm x 19mm
- Gewicht: 577g
- ISBN-13: 9780367365721
- ISBN-10: 0367365723
- Artikelnr.: 62607201
Noor Zaman Jhanjhi (NZ Jhanjhi) is currently working as Associate Professor, Director Center for Smart society 5.0 [CSS5], and Cluster Head for Cybersecurity cluster, at School of Computer Science and Engineering, Faculty of Innovation and Technology, Taylor's University, Malaysia. He is supervising a great number of Postgraduate students mainly in the cybersecurity for Data Science. Cybersecurity research cluster has extensive research collaboration globally with several institutions and professionals. Dr Jhanjhi is Associate Editor and Editorial Assistant Board for several reputable journals including IEEE Access Journal, PeerJ Computer Science, PC member for several IEEE conferences worldwide, and guest editor for the reputed indexed journals. Active reviewer for a series of Q1 journals, has been awarded globally as a top 1% reviewer by Publons (Web of Science). He has been awarded as outstanding Associate Editor by IEEE Access for the year 2020. He has high indexed publications in WoS/ISI/SCI/Scopus, and his collective research Impact factor is more than 300 points as of first half of 2021. He has international Patents on his account, edited/authored more than 29 research books published by world-class publishers. He has a great experience of supervising and co-supervising postgraduate students, an ample number of PhD and Master students graduated under his supervision. He is an external PhD/Master thesis examiner/evaluator for several universities globally. He has completed more than 22 international funded research grants successfully. He has served as Keynote speaker for several international conferences, presented several Webinars worldwide, chaired international conference sessions. His research areas include, Cybersecurity, IoT security, Wireless security, Data Science, Software Engineering, UAVs. Khalid Hussain has completed his PhD. in Computer Science from Universiti Teknologi Malaysia, Malaysia. He has total 31 years of teaching, industrial and administrative experience nationally and internationally. He has an intensive background of industry as well as academic quality accreditation in higher education besides scientific research activities, he had worked as convener with higher education commission of Pakistan for academic accreditation (National Computing Education Accreditation Council) for more than a decade and earned NCEAC accreditation five time for two programs at computer science and information technology department The University of Lahore. He also worked for National Computing Education Accreditation Council (NCEAC) Pakistan for evaluating other universities computing programs. Up till now he evaluate up to 31 universities He has experienced in teaching advanced era technological courses including, Advance Networks, Cryptography and Network Security, Operating System, Research Methods, Cloud Computing besides other undergraduate and postgraduate courses, graduation projects and thesis supervision. Khalid Hussain is an active researcher in the domain of cyber security. He is reviewer of several well reputed indexed journals. He has authored several research papers in ISI indexed and impact factor research journals\IEEE international conferences three books and one book chapter. He has successfully completed more than 06 national and international funded applied research projects. He also served as Keynote speaker for several conferences around the globe. He also chaired international conference sessions and presented session talks internationally. He has strong analytical, problem solving, interpersonal and communication skills. His areas of interest include Cyber Security, Wireless Sensor Network (WSN), Internet of Things (IoT), Mobile Application Development, Ad hoc Networks, Cloud Computing, Big Data, Mobile Computing, and Software Engineering. AZWEEN ABDULLAH (Senior Member, IEEE) has been contributing to research, teaching, consulting and in administrative services to the institutions that he has been working for thus far. He is a professional development alumni of Stanford University and MIT and his work experience includes thirty years as an academic in institutions of higher learning and as director of research and academic affairs at two institutions of higher learning, vice-president for educational consultancy services, fifteen years in commercial companies as Software Engineer, Systems Analyst and as a computer software developer and IT/MIS consultancy and training. Dr. Azween Abdullah has several patents under his name and been actively serving as expert reviewer and editorial board member for several high impact technical journals. Prior to joining Taylors University, Dr. Azween Abdullah served as faculty member at Monash University Malaysia and Universiti Teknoloji Petronas. He also serves as the adjunct research professor at the Malaysian University of Science and Technology. He has guided twelve PhD students and ten Masters students under his supervision and have secured both international and local research funding of more than RM700k. He is a fellow of the British Computer Society and members of IEEE and ACM. Dr. Azween Abdullah's general research interests are in the areas of cyber security and trustworthy computing, formal models of computation, and bio-inspired and quantum computing. He has been consulting for some technology companies in content development and has done research on emerging areas of networked and quantum security. He has been involved with a number of government and semi-government organisations in Malaysia in the role of external consultant and currently works with several government linked companies and industries to promote cyber security capacity development. He has also published more than 150 publications in various technical journals and conference proceedings and has given technical talks in a number of key international conferences, industry summits and forums. Mamoona Humayun, College of Computer and Information Sciences, Sakaka, Saudi Arabia Mamoona Humayun received the PhD. degree in computer architecture from the Harbin Institute of Technology, China. She has 12 years of teaching and administrative experience internationally. She has supervised various master's and Ph.D. thesis. Her research interests include global software development, requirement engineering, knowledge management, cybersecurity, and wireless sensor networks. She is an active Reviewer for a series of journals. JOÃO MANUEL R. S. TAVARES graduated in mechanical engineering from the Universidade do Porto, Portugal, in 1992. He received the M.Sc. and Ph.D. degrees in electrical and computer engineering from the Universidade do Porto, in 1995 and 2001, respectively, and the Habilitation degree in mechanical engineering, in 2015. He is currently a Senior Researcher with the Instituto de Ciência e Inovação em Engenharia Mecânica e Engenharia Industrial and an Associate Professor with the Department of Mechanical Engineering, Faculdade de Engenharia da Universidade do Porto. He is the co-editor of more than 40 books, and the co-author of more than 35 book chapters and 600 articles in international and national journals and conferences. He holds three international patents and two national patents. He has been a Committee Member for several international and national journals and conferences. He is the co-founder and the co-editor of the book series Lecture Notes in Computational Vision and Biomechanics (Springer). He has been a (Co-)Supervisor for several M.Sc. and Ph.D. theses and a Supervisor for several Postdoctoral projects. He has participated in many scientific projects as a Researcher and as a Scientific Coordinator. His main research interests include computational vision, medical imaging, computational mechanics, scientific visualization, human-computer interaction, and new product development. He is the Founder and the Editor-in-Chief of the Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization (Taylor & Francis) and the Co-Founder and the Co-Chair of the International Conference Series, including CompIMAGE, ECCOMAS Vip IMAGE, ICCEBS, and BioDental. More information can be found at www.fe.up.pt/ tavares.
Chapter 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC
Protocol for Wireless Sensor Network
Chapter 2 Software-Defined Networking (SDN) Security Concerns
Chapter 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy
Inference Logic
Chapter 4 Security in Big Data
Chapter 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security
Infrastructure
Chapter 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in
Detecting Known/Unknown Attacks
Chapter 7 PDF Malware Classifiers - A Survey, Future Directions, and
Recommended Methodology
Chapter 8 Key Authentication Schemes for Medical Cyber Physical System
Chapter 9 Ransomware Attack: Threats & Different Detection Technique
Chapter 10 Security Management System (SMS)
Chapter 11 Automatic Street Light Control Based on Pedestrian and
Automobile Detection
Chapter 12 Cost-Oriented Electronic Voting System Using Hashing Function
with Digital Persona
Chapter 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot
with IoT-RFID
Protocol for Wireless Sensor Network
Chapter 2 Software-Defined Networking (SDN) Security Concerns
Chapter 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy
Inference Logic
Chapter 4 Security in Big Data
Chapter 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security
Infrastructure
Chapter 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in
Detecting Known/Unknown Attacks
Chapter 7 PDF Malware Classifiers - A Survey, Future Directions, and
Recommended Methodology
Chapter 8 Key Authentication Schemes for Medical Cyber Physical System
Chapter 9 Ransomware Attack: Threats & Different Detection Technique
Chapter 10 Security Management System (SMS)
Chapter 11 Automatic Street Light Control Based on Pedestrian and
Automobile Detection
Chapter 12 Cost-Oriented Electronic Voting System Using Hashing Function
with Digital Persona
Chapter 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot
with IoT-RFID
Chapter 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC
Protocol for Wireless Sensor Network
Chapter 2 Software-Defined Networking (SDN) Security Concerns
Chapter 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy
Inference Logic
Chapter 4 Security in Big Data
Chapter 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security
Infrastructure
Chapter 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in
Detecting Known/Unknown Attacks
Chapter 7 PDF Malware Classifiers - A Survey, Future Directions, and
Recommended Methodology
Chapter 8 Key Authentication Schemes for Medical Cyber Physical System
Chapter 9 Ransomware Attack: Threats & Different Detection Technique
Chapter 10 Security Management System (SMS)
Chapter 11 Automatic Street Light Control Based on Pedestrian and
Automobile Detection
Chapter 12 Cost-Oriented Electronic Voting System Using Hashing Function
with Digital Persona
Chapter 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot
with IoT-RFID
Protocol for Wireless Sensor Network
Chapter 2 Software-Defined Networking (SDN) Security Concerns
Chapter 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy
Inference Logic
Chapter 4 Security in Big Data
Chapter 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security
Infrastructure
Chapter 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in
Detecting Known/Unknown Attacks
Chapter 7 PDF Malware Classifiers - A Survey, Future Directions, and
Recommended Methodology
Chapter 8 Key Authentication Schemes for Medical Cyber Physical System
Chapter 9 Ransomware Attack: Threats & Different Detection Technique
Chapter 10 Security Management System (SMS)
Chapter 11 Automatic Street Light Control Based on Pedestrian and
Automobile Detection
Chapter 12 Cost-Oriented Electronic Voting System Using Hashing Function
with Digital Persona
Chapter 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot
with IoT-RFID