- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing cyber ranges in leading urban sectors like military, academic and commercial.
Andere Kunden interessierten sich auch für
- Designing Network On-Chip Architectures in the Nanoscale Era87,99 €
- Reuse in Intelligent Systems78,99 €
- The SIM Guide to Enterprise Architecture87,99 €
- Brian KingPerformance Assurance for IT Systems82,99 €
- Parallel and Distributed Processing Techniques and Applications175,99 €
- Mark LudwigThe Giant Black Book of Computer Viruses38,99 €
- John LevesqueProgramming for Hybrid Multi/Manycore Mpp Systems66,99 €
-
-
-
With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing cyber ranges in leading urban sectors like military, academic and commercial.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 204
- Erscheinungstermin: 8. Oktober 2024
- Englisch
- Abmessung: 254mm x 178mm x 11mm
- Gewicht: 367g
- ISBN-13: 9781032251424
- ISBN-10: 1032251425
- Artikelnr.: 71670943
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 204
- Erscheinungstermin: 8. Oktober 2024
- Englisch
- Abmessung: 254mm x 178mm x 11mm
- Gewicht: 367g
- ISBN-13: 9781032251424
- ISBN-10: 1032251425
- Artikelnr.: 71670943
Prof Dr Bishwajeet Pandey has completed his PhD in CSE from Gran Sasso Science Institute, L'Aquila, Italy under guidance of Prof Paolo Prinetto, Politecnico Di Torino (World Ranking 13 in Electrical Engineering). He has worked as an Asst. Professor in Department of Research at Chitkara University, Junior Research Fellow (JRF) at South Asian University and Lecturers in Indira Gandhi National Open University. He has completed Master of Technology (IIIT Gwalior) in CSE with Specialization in VLSI, Master of Computer Application, R&D Pro-ject in CDAC-Noida. He has authored and coauthored 137 papers available on his Scopus Profile (https://www.scopus.com/authid/detail.uri?authorId=57203239026). He has 1400+ Citation according to his Google Scholar Profile(https://scholar.google.co.in/citations?user=UZ_8yAMAAAAJ&hl=en). He has an experience of teaching of Innovation and Startup, Computer Network, Digital Logic, Logic Synthesis, System Verilog. His area of research interest is Green Computing, High Performance Computing, Cyber Physical System, Artificial Intelligence, Machine Learning, and Cyber Security. He is in board of director of many startups of his Students e.g. Gyancity Research Consultancy Pvt Ltd. Dr Engr Shabeer Ahmad received the received his B.Eng. degree in ICT and Electronics engineering and M.Sc. degree (M.S) in Information & Control engineering (with summa cum laude) both from the University of L'Aquila, L'Aquila Italy. According to the Italian newspapers, he was the first foreigner (Asian) to graduate with a gold medal from an Italian university. In 2016, he became visiting research assistant in Shibaura Institute of Technology Tokyo and subsequently, he got a permanent position as a control-systems Engineer in one of the best Japanese Multinational TOSHIBA CORPORATION Tokyo, Japan before joining one of the top Italian research institutes, Gran-Sasso Science Institute (National Institute for Nuclear Physics) L'Aquila Italy- to continue his study of Doctor of Philosophy (PhD) in field of Cyber-Security and control systems. In 2018, he got the Young Scientist Award at the 4th International Conference on Green Computing and Engineering Technologies, August 2018 at Aalborg University, Denmark. His main areas of research interest are Linear and Nonlinear control systems, Cyber-security for the critical infrastructures, Hybrid Cyber-Ranges, Emulation of the Critical infrastructures with special emphasis on Water-supply System.
1. Introduction to Cyber Ranges 2. Architectural Design & Tools of Cyber
Range. 3. Motivation for construction of Cyber Range. 4. Types of Cyber
Range. 5. Roles of Cyber Range: Testing, Training, and Research. 6.
Cybersecurity Exercises and Teams definition. 7. Simulation and Emulation
environments. 8. Designing a cyber range. 9. Military Cyber Range. 10.
Existing Cyber Ranges in Academic Sector.
Range. 3. Motivation for construction of Cyber Range. 4. Types of Cyber
Range. 5. Roles of Cyber Range: Testing, Training, and Research. 6.
Cybersecurity Exercises and Teams definition. 7. Simulation and Emulation
environments. 8. Designing a cyber range. 9. Military Cyber Range. 10.
Existing Cyber Ranges in Academic Sector.
1. Introduction to Cyber Ranges 2. Architectural Design & Tools of Cyber Range. 3. Motivation for construction of Cyber Range. 4. Types of Cyber Range. 5. Roles of Cyber Range: Testing, Training, and Research. 6. Cybersecurity Exercises and Teams definition. 7. Simulation and Emulation environments. 8. Designing a cyber range. 9. Military Cyber Range. 10. Existing Cyber Ranges in Academic Sector.
1. Introduction to Cyber Ranges 2. Architectural Design & Tools of Cyber
Range. 3. Motivation for construction of Cyber Range. 4. Types of Cyber
Range. 5. Roles of Cyber Range: Testing, Training, and Research. 6.
Cybersecurity Exercises and Teams definition. 7. Simulation and Emulation
environments. 8. Designing a cyber range. 9. Military Cyber Range. 10.
Existing Cyber Ranges in Academic Sector.
Range. 3. Motivation for construction of Cyber Range. 4. Types of Cyber
Range. 5. Roles of Cyber Range: Testing, Training, and Research. 6.
Cybersecurity Exercises and Teams definition. 7. Simulation and Emulation
environments. 8. Designing a cyber range. 9. Military Cyber Range. 10.
Existing Cyber Ranges in Academic Sector.
1. Introduction to Cyber Ranges 2. Architectural Design & Tools of Cyber Range. 3. Motivation for construction of Cyber Range. 4. Types of Cyber Range. 5. Roles of Cyber Range: Testing, Training, and Research. 6. Cybersecurity Exercises and Teams definition. 7. Simulation and Emulation environments. 8. Designing a cyber range. 9. Military Cyber Range. 10. Existing Cyber Ranges in Academic Sector.