Systematic Security: A CISOs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approac...Loe edasi...
Sari: AAP Research Notes on Optimization and Decision Making Theories
(Ilmumisaeg: 06-Jul-2025, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781003459040)
Focuses on state-of-the-art methods and tools such as data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pansharpening, and digital signatures to help in protect...Loe edasi...
The text presents a systematic review of the opportunities and existing security/privacy concerns in the 6G communications system. It further discusses spectrum allocation and management, network architecture and heterogeneity, energy efficiency and...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges....Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of clo...Loe edasi...
In an increasingly interconnected digital realm, Ubiquitous and Transparent Security: Challenges and Applications emerges as a guiding beacon through the intricate web of modern cybersecurity....Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map sec...Loe edasi...
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity) policy and practices, legal matters (law, regulatory, contractual, privacy), and...Loe edasi...
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificial Intelligence and Machine Learning with its relationship with OpenAI is examined. An overview into ChatGPT is provided, with a d...Loe edasi...
The book Blockchain and AI in Cyber Physical System (CPS) explores the intersection of blockchain technology, artificial intelligence (AI), and cyber physical systems (CPS). It discusses how these technologies can be integrated to create secure an...Loe edasi...
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security....Loe edasi...
The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, gra...Loe edasi...
This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, its a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect t...Loe edasi...
This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration....Loe edasi...
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor ne...Loe edasi...
This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system....Loe edasi...
This book is written with an intension to provide a thorough and detailed discussion on various fundamental aspects of cloud security. It provides an insight in to cloud computing including definition, history, characteristics, service models, cloud...Loe edasi...
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the comp...Loe edasi...