110,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
55 °P sammeln
  • Format: PDF

This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.

Produktbeschreibung
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.

Autorenporträt
Dr. Aboul-Ella Hassanien is a Professor in the Faculty of Computers and Information at Cairo University, Egypt, and Visiting Professor at the College of Business Administration, Kuwait University.
Dr. Aboul-Ella Hassanien is a Professor in the Faculty of Computers and Information at Cairo University, Egypt, and Visiting Professor at the College of Business Administration, Kuwait University.
Rezensionen
From the book reviews:

"This book on bio-inspiring cyber security and cloud services is part of Springer's 'Intelligent Systems Reference Library' series, which discusses advances in intelligent systems. ... The volume tries to highlight the advantages of bio-inspiring cyber security. ... This reference book will be an eye-opener to the applications of bio-inspired techniques for cyber security. I recommend it for students and researchers in that area." (S. V. Nagaraj, Computing Reviews, February, 2015)