Security and Privacy in Cyberspace (eBook, PDF)
96,29 €
inkl. MwSt.
Sofort per Download lieferbar
Security and Privacy in Cyberspace (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 6.87MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Next-Generation Cybersecurity (eBook, PDF)149,79 €
- Strategic Engineering for Cloud Computing and Big Data Analytics (eBook, PDF)106,99 €
- Advances in Risk and Reliability Modelling and Assessment (eBook, PDF)192,59 €
- Fadele Ayotunde AlabaSecurity Framework and Defense Mechanisms for IoT Reactive Jamming Attacks (eBook, PDF)139,09 €
- Human Reliability Programs in Industries of National Importance for Safety and Security (eBook, PDF)106,99 €
- Farhad BalaliData Intensive Industrial Asset Management (eBook, PDF)96,29 €
- Exploring the Security Landscape: Non-Traditional Security Challenges (eBook, PDF)96,29 €
-
-
-
This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Erscheinungstermin: 28. August 2022
- Englisch
- ISBN-13: 9789811919602
- Artikelnr.: 65471165
- Verlag: Springer Nature Singapore
- Erscheinungstermin: 28. August 2022
- Englisch
- ISBN-13: 9789811919602
- Artikelnr.: 65471165
Dr. Omprakash Kaiwartya (Senior Member, IEEE) received his Ph.D. degree in computer science from Jawaharlal Nehru University, New Delhi, India, in 2015. He is currently working as a Senior Lecturer at Nottingham Trent University, U.K. His research interest focuses on drone-enabled networking, E-mobility-centric electric vehicles, IoT-enabled smart services, connected vehicles, and next generation wireless systems.
Mr. Keshav Kaushik is currently an Assistant Professor in the School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He has over 7 years of teaching and research experience in Cybersecurity, Digital Forensics, the Internet of Things, and Blockchain Technology. Mr. Kaushik received his B.Tech degree in Computer Science and Engineering from the University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak. In addition, M.Tech degree in Information Technology from YMCA University of Science and Technology, Faridabad, Haryana. He has published over 20 research articles in International Journals and has presented at International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, and Quick Heal Academy certified Cyber Security Professional (QCSP). He has been a keynote speaker and delivered 50+ professional talks at various national and international platforms. He has edited more than 7 books.
Dr. Sachin Kumar Gupta received his Ph.D. with Specialization in Systems Engineering from Indian Institute of Technology (Banaras Hindu University), Varanasi (UP), India, in 2016. Currently, he is working as Assistant Professor in the School of Electronics and Communication Engineering, Shri Mata Vaishno Devi University, Kakryal, Katra, (J&K), India. His research interest includes cryptography and network security, networking.
Dr. Ashutosh Mishra obtained his Ph.D. from the Department of Electronics Engineering, Indian Institute of Technology (Banaras Hindu University) Varanasi in 2018. Currently, he is working as Postdoctoral Research Fellow (KRF) at Yonsei University International Campus, South Korea. His research interests include artificial intelligence, self-driving car, smart sensors, intelligent systems, security issues, and current trends in emerging networking.
Dr. Manoj Kumar completed his Ph.D. from The Northcap University and M.Sc. (Information Security and Digital Forensics) from Technological University Dublin (Formerly ITB Blanchardstown) Ireland in 2013. He has over 11 years of research, teaching, and corporate experience. Dr. Kumar is currently working as an Associate Professor in the School of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun. His research interests are in the areas of Machine Learning, Digital Image Processing, Digital Forensics, WSN, and Information Security. He has published over 85 articles in international refereedjournals and conferences.
Mr. Keshav Kaushik is currently an Assistant Professor in the School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. He has over 7 years of teaching and research experience in Cybersecurity, Digital Forensics, the Internet of Things, and Blockchain Technology. Mr. Kaushik received his B.Tech degree in Computer Science and Engineering from the University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak. In addition, M.Tech degree in Information Technology from YMCA University of Science and Technology, Faridabad, Haryana. He has published over 20 research articles in International Journals and has presented at International Conferences. He is a Certified Ethical Hacker (CEH) v11, CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, and Quick Heal Academy certified Cyber Security Professional (QCSP). He has been a keynote speaker and delivered 50+ professional talks at various national and international platforms. He has edited more than 7 books.
Dr. Sachin Kumar Gupta received his Ph.D. with Specialization in Systems Engineering from Indian Institute of Technology (Banaras Hindu University), Varanasi (UP), India, in 2016. Currently, he is working as Assistant Professor in the School of Electronics and Communication Engineering, Shri Mata Vaishno Devi University, Kakryal, Katra, (J&K), India. His research interest includes cryptography and network security, networking.
Dr. Ashutosh Mishra obtained his Ph.D. from the Department of Electronics Engineering, Indian Institute of Technology (Banaras Hindu University) Varanasi in 2018. Currently, he is working as Postdoctoral Research Fellow (KRF) at Yonsei University International Campus, South Korea. His research interests include artificial intelligence, self-driving car, smart sensors, intelligent systems, security issues, and current trends in emerging networking.
Dr. Manoj Kumar completed his Ph.D. from The Northcap University and M.Sc. (Information Security and Digital Forensics) from Technological University Dublin (Formerly ITB Blanchardstown) Ireland in 2013. He has over 11 years of research, teaching, and corporate experience. Dr. Kumar is currently working as an Associate Professor in the School of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun. His research interests are in the areas of Machine Learning, Digital Image Processing, Digital Forensics, WSN, and Information Security. He has published over 85 articles in international refereedjournals and conferences.
1. Taxonomy of Security Attacks on Internet of Things.- 2. Cyber Threats, Attack Strategy and Ethical Hacking in Telecommunications Systems.- 3. Blockchain-based Solutions for Cybersecurity: Architecture, Applications and Review.- 4. Blockchain and IoT Unanimity in A Smart Metropolitan Development.- 5. Internet of X-Enabled Intelligent Unmanned Aerial Vehicles Security for Hyper Connected Societies.- 6. Secure Bank Transaction Using Blockchain Computing and Forest Oddity.- 7. Distributed Ledger Technology: Use cases, Design, and Implementation Issues.
1. Taxonomy of Security Attacks on Internet of Things.- 2. Cyber Threats, Attack Strategy and Ethical Hacking in Telecommunications Systems.- 3. Blockchain-based Solutions for Cybersecurity: Architecture, Applications and Review.- 4. Blockchain and IoT Unanimity in A Smart Metropolitan Development.- 5. Internet of X-Enabled Intelligent Unmanned Aerial Vehicles Security for Hyper Connected Societies.- 6. Secure Bank Transaction Using Blockchain Computing and Forest Oddity.- 7. Distributed Ledger Technology: Use cases, Design, and Implementation Issues.
1. Taxonomy of Security Attacks on Internet of Things.- 2. Cyber Threats, Attack Strategy and Ethical Hacking in Telecommunications Systems.- 3. Blockchain-based Solutions for Cybersecurity: Architecture, Applications and Review.- 4. Blockchain and IoT Unanimity in A Smart Metropolitan Development.- 5. Internet of X-Enabled Intelligent Unmanned Aerial Vehicles Security for Hyper Connected Societies.- 6. Secure Bank Transaction Using Blockchain Computing and Forest Oddity.- 7. Distributed Ledger Technology: Use cases, Design, and Implementation Issues.
1. Taxonomy of Security Attacks on Internet of Things.- 2. Cyber Threats, Attack Strategy and Ethical Hacking in Telecommunications Systems.- 3. Blockchain-based Solutions for Cybersecurity: Architecture, Applications and Review.- 4. Blockchain and IoT Unanimity in A Smart Metropolitan Development.- 5. Internet of X-Enabled Intelligent Unmanned Aerial Vehicles Security for Hyper Connected Societies.- 6. Secure Bank Transaction Using Blockchain Computing and Forest Oddity.- 7. Distributed Ledger Technology: Use cases, Design, and Implementation Issues.