The emergence of quantum computing introduces a significant shift in the digital and security landscapeprompting organizations to reassess the foundations of how we protect information. Systematic Security: Building Quantum Securityis a practical gu...More info...
A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book examines the design, optimization, and implementation of crypto engines, ensuring efficiency and robustness in encryption and hashi...More info...
Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. As technology has progressed, so has the complexity of the methods used to protect our data....More info...
Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniq...More info...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications....More info...
This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods....More info...
In this book, we will provide an overview of the fundamental concepts of Edge Computing, Edge intelligence using advanced machine and deep learning models, architecture of Edge computing based IoT system, and edge computing based cyber threat intell...More info...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools needed...More info...
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning and cloud computing combine to drive data-driven decision-making across industries....More info...
This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language...More info...
Offers a new approach to storytelling by weaving coding into stories. Playfully, it encourages the readers to see computing as easier to understand and present in most disciplines. Might benefit middle school, high school, college, university studen...More info...
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examining...More info...
This book analyzes blockchain in the metaverse ecosystem and its future, starting with clear definitions of AI, blockchain, and Metaverse. It discusses the evolution of the blockchain and addresses government involvement, virtual real estate, and em...More info...
While coding is intertwined into simple facts, Nature Appreciation shows ways we appreciate nature, thus, helping us learn in a playful, nonjudgmental way....More info...
Mixes experiences in art, coding, music, dance, choreography, video, and stage design. Many people relax when coding is introduced as a language, rather than math....More info...
This book explores the integration of Cryptography, Blockchain, and Artificial Intelligence (AI) in areas like Big Data, bioinformatics, IoT, 5G, and Industry 4.0....More info...
This book provides an overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security....More info...
This book gives a detailed description about integration of blockchain technology and digital twin solutions in modern farming. This book covers the core principles, practical applications, and some real-world case studies, with offering a practical...More info...
This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications. A useful guide for healthcare professionals, patients, policymakers, and...More info...
This book provides, for the first time, a definitive source for the main theoretical notions underpinning this fascinating area of study. It also supplies several useful surveys of constructions using Coding Theory, Design Theory and Finite Geometry...More info...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...More info...
Delves into the nexus of cybersecurity, data science, and sustainable development in a variety of areas. The book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cybe...More info...
This text presents innovative research-oriented ideas, and the implementation and socio-economic applications of internet of things-based network. It showcases smart waste management, optical technologies for internet of things, and remote patient m...More info...
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape....More info...
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defi...More info...
In todays ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of...More info...
The objective of this book is to exhibit recent solutions and to discuss the opportunities that AI, Blockchain, and even their combinations can present to solve the issue of IoT security....More info...
This book presents a fresh perspective on combating cybercrime, showcasing innovative solutions from experts across various fields. With the integration of artificial intelligence (AI), contemporary challenges are addressed with state-of-the-art str...More info...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...More info...
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans....More info...
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks. This book covers the fundamental concepts of security and privacy in WBANs includi...More info...
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book st...More info...
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as Digital Forensics. This is where specially trained Digital Forensics Investigators collect and comb throug...More info...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....More info...
Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements and best practices in securing digital health systems....More info...
Mathematical Foundations of Computer Science introduces students to the discrete mathematics needed later in their Computer Science coursework with theory of computation topics interleaved throughout. Students learn about mathematical concepts just...More info...
The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow....More info...
(Pub. Date: 21-Oct-2024, Publisher: River Publishers, ISBN-13: 9781003337768)
This book provides a comprehensive introduction to the foundations of cryptography and network security. As well as a thorough presentation of the evolution of the topic the book includes information about basic hacker attacks, alternatives to preve...More info...
This book consolidates findings previously published in prestigious international journals and presented at leading conferences. The book introduces basic mathematical concepts, and later chapters build upon these foundations, but each focusses on s...More info...
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples. It provides a learning tool for engineers as well as for researchers and scientists of ad...More info...
This book presents essential principles, technical information, and expert insights on multimedia security technology. It also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniqu...More info...
This book offers a thorough examination of the potential of blockchain to transform musical practices. Moving beyond blockchains financial applications, this book presents various perspectives on how this technology plays an important role in a crea...More info...
The book underscores AIs transformative impact on reshaping physical, digital, and biological boundaries, converging with technologies like robotics, IoT, 3D printing, genetic engineering, and quantum computingtermed Web 3.0 Industrial Revolution...More info...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...More info...
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the interconnected and often critical nature of these systems. Secure and Smart Cyber-Physical Systems provides an extensive exploration of...More info...
Lee Parrish provides an example-laden vision to improve cybersecurity governance in the boardroom. Additionally, Lee deciphers the technical jargon to increase the readers cyber fluency makes you able to ask direct questions, understand the answers...More info...
The book, The Future of Human-Computer Integration: Industry 5.0 Technology, Tools and Algorithms, provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation....More info...
This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses....More info...
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and the solutions based on Software Defined Networks are discussed....More info...