Secure Health (eBook, ePUB)
A Guide to Cybersecurity for Healthcare Managers
Redaktion: Hammad, Mohamed; Abd El-Latif, Ahmed A.; Maleh, Yassine; El-Affendi, Mohammed A.; Ali, Gauhar
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Secure Health (eBook, ePUB)
A Guide to Cybersecurity for Healthcare Managers
Redaktion: Hammad, Mohamed; Abd El-Latif, Ahmed A.; Maleh, Yassine; El-Affendi, Mohammed A.; Ali, Gauhar
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
"Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements and best practices in securing digital health systems.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
Andere Kunden interessierten sich auch für
- Secure Health (eBook, PDF)52,95 €
- Andres AndreuThe CISO Playbook (eBook, ePUB)47,95 €
- Akashdeep BhardwajInsecure Digital Frontiers (eBook, ePUB)47,95 €
- Lukasz OlejnikPhilosophy of Cybersecurity (eBook, ePUB)47,95 €
- Ravindra DasThe Zero Trust Framework and Privileged Access Management (PAM) (eBook, ePUB)31,95 €
- Tara KissoonOptimal Spending on Cybersecurity Measures (eBook, ePUB)47,95 €
- Tony ThomasIntelligent Mobile Malware Detection (eBook, ePUB)47,95 €
-
-
-
"Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements and best practices in securing digital health systems.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Erscheinungstermin: 6. November 2024
- Englisch
- ISBN-13: 9781040154397
- Artikelnr.: 72335644
- Verlag: Taylor & Francis
- Erscheinungstermin: 6. November 2024
- Englisch
- ISBN-13: 9781040154397
- Artikelnr.: 72335644
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mohamed Hammad received his Ph.D. degree in 2019 from the School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China. He is an assistant professor in the Faculty of Computers and Information, Menoufia University, Egypt. He is currently a researcher in the EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University. His research interests include Biomedical Imaging, Bioinformatics, Cyber Security, IoT, Computer Vision, Machine Learning, Deep Learning, Pattern Recognition, and Biometrics. He has published more than 50 papers in international SCI-IF journals. Furthermore, he has served as an Editor Board member in PLOS ONE journal, an Editor Board member in BMC Bioinformatics journal, an Associate Editor in IJISP, a Topics Board editor in Forensic Sciences (MPDI) journal, a guest editor in many international journals such as IJDCF, Sensors (MDPI) and Information (MDPI). Reviewer of more than 500 papers for many prestigious journals and listed in the top 2% of scientists worldwide (According to the recently released list by Stanford University USA in 2022 and 2023). Gauhar Ali received the M.S. degree in computer science from the Institute of Management Sciences, Peshawar, Pakistan, in 2012, and the Ph.D. degree in computer science from the University of Peshawar, Peshawar. He is currently a Postdoctoral Researcher with the EIAS Data Science and Blockchain Laboratory, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia. His research interests include the Internet of Things, access control, blockchain, machine learning, wireless sensor networks, intelligent transportation systems, formal verification, and model checking. Mohammed A. El-Affendi is currently a Professor of computer science with the Department of Computer Science, Prince Sultan University, the former Dean of CCIS, AIDE, the Rector, the Founder, and the Director of the Data Science Laboratory (EIAS), and the Founder and the Director of the Center of Excellence in CyberSecurity. His current research interests include data science, intelligent and cognitive systems, machine learning, and natural language processing. Yassine Maleh (Senior Member, IEEE) received the Ph.D. degree in computer science from Hassan 1st University in Morocco, in 2017. He is currently a Professor in cybersecurity and a Practitioner with industry and academic experience. Since 2019, he has been a Professor in cybersecurity with Sultan Moulay Slimane University, Beni Mellal, Morocco. From 2012 to 2019, he was the Chief Security Officer with the National Ports Agency in Morocco. He is the Founding Chair of IEEE Consultant Network Morocco and the Founding President of the African Research Center of Information Technology & Cybersecurity. He is a member of the International Association of Engineers and Machine Intelligence Research Labs. He has made contributions in the fields of information security and privacy, the Internet of Things security, and wireless and constrained networks security. His research interests include information security and privacy, the Internet of Things, networks security, information system, and IT governance. He has authored or coauthored more than 100 papers (book chapters, international journals, and conferences/workshops), 24 edited books, and 4 authored books. Dr. Maleh is currently the Editor-in-Chief of the International Journal of Information Security and Privacy and International Journal of Smart Security Technologies. He is also an Associate Editor for IEEE Access (2019 Impact Factor 4.098) and a Series Editor of Advances in Cybersecurity Management by CRC Taylor & Francis. He has served and continues to serve on executive and technical program committees and as a Reviewer of numerous international conferences and journals, such as Elsevier's Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer's Cluster Computing. He was the Publicity Chair of BCCA 2019 and the General Chair of the MLBDACP 19 symposium and ICI2C'21 Conference. He was the recipient of Publons Top 1% reviewer award for 2018 and 2019. Ahmed A. Abd El-Latif graduated with distinction from the Harbin Institute of Technology, China, in 2013, earning a Ph.D. Since then, he has led and participated in several successful research projects and secured grants in Egypt, the Russian Federation, Saudi Arabia, China, Malaysia, and Tunisia. Currently, Dr. Abd El-Latif holds staff positions at Menoufia University, Egypt, and Prince Sultan University, Saudi Arabia. With over 18 years of professional experience, he has published approximately 300 papers in journals and conference proceedings, including 12 books, with over 10,000 citations. Since 2022, he has served as Head of the MEGANET 6G Lab Research in the Russian Federation. Dr. Abd El-Latif holds several leadership positions, including Vice Chair of the EIAS Research Lab, Founder and Deputy Director of the Center of Excellence in Quantum & Intelligent Computing (Prince Sultan University, Saudi Arabia). He has received several awards, including the State Encouragement Award in Engineering Sciences from the Arab Republic of Egypt in 2016, the Best Ph.D. Student Award from the Harbin Institute of Technology, China, in 2013, and the Young Scientist Award from Menoufia University, Egypt, in 2014. Dr. Abd El-Latif actively participates in the scientific community, serving as Chair/Co-Chair of several Scopus/EI conferences. He also holds editorial positions, including Editor-in-Chief of the International Journal of Information Security and Privacy, Series Editor of Quantum Information Processing and Computing, and Series Editor of Advances in Cybersecurity Management. Additionally, he serves as an academic editor or associate editor for many indexed journals in the Web of Science (WoS) and Scopus, covering various quartiles. Dr. Abd El-Latif's research interests span quantum communications and cryptography, cybersecurity, artificial intelligence of things (AIoT), AI-based image processing, information hiding, and applications of dynamical systems (discrete-time models: chaotic systems and quantum walks) in cybersecurity.
1 Introduction
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND
AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA
BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND
MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies
in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and
Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for
IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN
DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote
Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA
VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA
PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security
Governance Standards and Frameworks
ABDELKEBIR SAHID
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND
AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA
BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND
MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies
in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and
Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for
IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN
DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote
Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA
VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA
PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security
Governance Standards and Frameworks
ABDELKEBIR SAHID
1 Introduction
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND
AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA
BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND
MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies
in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and
Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for
IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN
DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote
Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA
VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA
PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security
Governance Standards and Frameworks
ABDELKEBIR SAHID
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND
AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA
BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND
MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies
in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and
Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for
IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN
DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote
Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA
VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA
PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security
Governance Standards and Frameworks
ABDELKEBIR SAHID