In todays hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate and counter cyber threats, navigating the increasingly dangerous digital landscap...Loe edasi...
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets....Loe edasi...
Dive into the capabilities of Wireshark with Wireshark Essentials, a concise guide focused on utilizing packet analysis for network security and troubleshooting....Loe edasi...
Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approac...Loe edasi...
Sari: AAP Research Notes on Optimization and Decision Making Theories
(Ilmumisaeg: 06-Jul-2025, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781003459040)
Focuses on state-of-the-art methods and tools such as data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pansharpening, and digital signatures to help in protect...Loe edasi...
The text presents a systematic review of the opportunities and existing security/privacy concerns in the 6G communications system. It further discusses spectrum allocation and management, network architecture and heterogeneity, energy efficiency and...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges....Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of clo...Loe edasi...
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity....Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map sec...Loe edasi...
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity) policy and practices, legal matters (law, regulatory, contractual, privacy), and...Loe edasi...
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificial Intelligence and Machine Learning with its relationship with OpenAI is examined. An overview into ChatGPT is provided, with a d...Loe edasi...
The book Blockchain and AI in Cyber Physical System (CPS) explores the intersection of blockchain technology, artificial intelligence (AI), and cyber physical systems (CPS). It discusses how these technologies can be integrated to create secure an...Loe edasi...
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security....Loe edasi...
The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, gra...Loe edasi...
This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, its a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect t...Loe edasi...
This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration....Loe edasi...
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor ne...Loe edasi...