Muutke küpsiste eelistusi

Cost-Effective Cybersecurity: A Multi-Tiered Defense Framework with Open-Source Solutions [Kõva köide]

  • Formaat: Hardback, 271 pages, kõrgus x laius: 235x155 mm, 95 Illustrations, color; 9 Illustrations, black and white
  • Sari: Digital Privacy and Security
  • Ilmumisaeg: 01-Jun-2026
  • Kirjastus: Springer Verlag, Singapore
  • ISBN-10: 9819552842
  • ISBN-13: 9789819552849
Teised raamatud teemal:
  • Kõva köide
  • Hind: 72,03 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 84,74 €
  • Säästad 15%
  • See raamat ei ole veel ilmunud. Raamatu kohalejõudmiseks kulub orienteeruvalt 3-4 nädalat peale raamatu väljaandmist.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 271 pages, kõrgus x laius: 235x155 mm, 95 Illustrations, color; 9 Illustrations, black and white
  • Sari: Digital Privacy and Security
  • Ilmumisaeg: 01-Jun-2026
  • Kirjastus: Springer Verlag, Singapore
  • ISBN-10: 9819552842
  • ISBN-13: 9789819552849
Teised raamatud teemal:
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing challenge of cybersecurity affordability, particularly for SMEs, educational institutions, and resource-constrained organizations, it offers a systematic approach to mitigating threats while ensuring scalability and resilience. The book provides empirical evaluations of security tools, real-world deployment insights, and practical implementation strategies, bridging the gap between theoretical cybersecurity principles and actionable solutions. By incorporating technical, economic, and strategic perspectives, it equips cybersecurity professionals, IT administrators, researchers, and policymakers with the knowledge to enhance security postures without incurring prohibitive costs. This publication stands out by offering a structured defense model, performance benchmarking of open-source solutions, and a forward-looking analysis of emerging threats, making it an essential resource for advancing cybersecurity resilience in financially constrained environments.
Chapter
1. Cybersecurity in the Digital Age: Threats, Challenges, and
Financial Considerations.
Chapter
2. The Multi-Tiered Cybersecurity Defense
Model: Principles and Frameworks.
Chapter 3.Proactive Threat Mitigation
(Layer 1) - Network Detection and Intrusion Prevention.
Chapter
4. Endpoint
Security in a Decentralized IT Landscape (Layer 2).
Chapter
5. Digital
Forensic Investigations and Incident Response (Layer 3).
Chapter
6. Security
Information and Event Management (SIEM) (Layer 4)- Real-Time Threat
Intelligence.
Chapter 7.Identity and Access Management (IAM) (Layer 5) -
Strengthening Authentication & Access Control.
Chapter
8. Human-Centric
Cyber Defense (Layer 6 )- Security Awareness & Training.
Chapter
9.
Deploying Open-Source Cybersecurity Tools: Best Practices and Case Studies.-
Chapter
10. Performance Evaluation and Benchmarking of Open-Source Security
Solutions.
Chapter
11. The Future of Cost-Effective Cybersecurity: Emerging
Threats and Innovations.
Hassan Jalil Hadi received the Ph.D. degree in Cyberspace Security from the School of Cyber Science and Engineering, Wuhan University, China. He is currently working as a Research Specialist at the Resilient Computing and Cybersecurity Center (RC3), King Abdullah University of Science and Technology (KAUST), Saudi Arabia. Previously, he served as a Cybersecurity Expert at the CRC Laboratory, National Center for Cyber Security, Islamabad, where he was engaged in threat detection, monitoring, mitigation, and audits aligned with industry standards for cybersecurity challenges. His research interests include IoT security, digital forensics, edge computing, and botnet detection and mitigation. In addition to his academic and research contributions, he holds multiple professional certifications, including CISM from ISACA, as well as CEH, CHFI, and ISO 27001 certifications, demonstrating his expertise in strategic security management, ethical hacking, digital forensics, and information security governance.



Muhammad Khurram Khan is a global thought leader and influencer in cybersecurity. He is a Professor of Cybersecurity at the Center of Excellence in Information Assurance, King Saud University, Saudi Arabia. He is the founder and CEO of the Global Foundation for Cyber Studies and Research, an independent and non-partisan cybersecurity think-tank in Washington, D.C., USA. He has contributed to cyber policy work for the G20 (Saudi and Italian Presidencies) in shaping a safer cyberspace for children, protecting the masses and vulnerable populations in cyberspace, and empowering and enabling women in the cybersecurity profession. In 2019, he played an instrumental role as a cybersecurity subject expert for a USD 6 million series B investment in a South Korean startup, "SecuLetter," which has received an IPO valuation of USD 100 million (2023). He is also an International Advisory Board Member at AIFT, which is a leading AI cybersecurity company.



He is the Editor in Chief of a well-reputed international journal Telecommunication Systems', published by Springer Nature for over 28 years, with a recent impact factor of 2.3 (JCR 2025). Furthermore, he is the area editor (Cybersecurity) of IEEE Communications Surveys & Tutorials, which has a 46.7 impact factor. Moreover, he has been on the editorial board of several journals, including, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Network Science and Engineering, IEEE Transactions on Mobile Computing, IEEE Communications Magazine, IEEE Transactions on Intelligent Vehicles, IEEE Internet of Things Journal, IEEE Transactions on Consumer Electronics, JNCA, and IEEE Communications Letters, etc. He serves as a referee for research foundations of Switzerland, Italy, Saudi Arabia, and the Czech Republic.



He has published over 500 research papers and holds 12 U.S. patents. His research focuses on cybersecurity, smart mobility security, AI security and governance, IoT security, digital authentication, cyber policy, and innovation management. He is a fellow of the IET, BCS, and



FTRA, and a senior member of IEEE and IACSIT. He also chaired an ITU working group on child online protection in the Metaverse.



Naveed Ahmad (Senior Member, IEEE) received his Ph.D. in computer science from the University of Surrey, U.K., in 2013. He is an Associate Professor at Prince Sultan University, Riyadh, Saudi Arabia. His research interests include security and privacy in emerging networks, such as VANETs, DTNs, IoT, machine learning, and big data.



Rehana Yasmin is a Research Scientist at KAUST, Saudi Arabia. Prior to this, she worked as an automotive cybersecurity researcher at Huawei International, Singapore from 2016 to 2023. Her research interests cover wide-ranging aspects of cybersecurity, including