Cyber Defense Mechanisms: Security, Privacy, and Challenges
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

1136768975
Cyber Defense Mechanisms: Security, Privacy, and Challenges
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

61.99 In Stock
Cyber Defense Mechanisms: Security, Privacy, and Challenges

Cyber Defense Mechanisms: Security, Privacy, and Challenges

Cyber Defense Mechanisms: Security, Privacy, and Challenges

Cyber Defense Mechanisms: Security, Privacy, and Challenges

Paperback

$61.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.


Product Details

ISBN-13: 9780367540968
Publisher: CRC Press
Publication date: 10/04/2024
Series: Artificial Intelligence (Ai): Elementary to Advanced Practices
Pages: 216
Product dimensions: 6.14(w) x 9.21(h) x 0.49(d)

About the Author

Gautam Kumar, PhD, is working with Dept. of Computer Science and Engineering, CMR Engineering College, Hyderabad. He received his PhD degree in Computer Science and Engineering from Jaypee University of Information Technology, Himachal Pradesh, India. He did his M.Tech from Rajasthan Technical University and B.E. from Rajiv Gandhi Proudyogiki Vishwavidyalaya, Madhya Pradesh. He is having a professional teaching experience of more than of 14+ years in the various institutions Institute of Engineering and Technology, Rajasthan, ICFAI University, Hyderabad, and Narsimha Reddy Engineering College, Hyderabad, India. He has taught more than of 20 Computer Science & Engineering subjects. His research interests are in the field of Cryptography, Information Security, Algorithms Designs and Analysis. He has published more than 35 research journals and conferences papers of repute in Science Citation Indexed and Scopus Indexed Journals. Till date he is having two patents. He is a Reviewer of (i) Security and Communication Networks, John Wiley & Sons[Indexed in Science Citation Indexed, SCOPUS], (ii) The Computer Journal, Oxford Academic [Indexed in Science Citation Indexed, SCOPUS], & many Reputes of IEEE/ACM International Conferences. In his credit, he is has handled various responsibility such as Institute’s Innovation Council, President from Institute, and Smart-India Hackthon, Convenor (MHRD).

Dinesh Kumar Saini is an Associate Professor working with Faculty of Computing, Information Technology, Sohar University, Sultanate of Oman. He is having experience of more than 18+ years in academic. He has handled various administrative posts. He has published more than 120 research journals and conferences papers of repute. He is also part of the editorial and advisory board of several journals and has been editor of several special issues in books and journals. He has supervised various academic R&D projects. His area of expertise in Computer Science and Engineering, Information Technology, Software Systems, Business Administration and Human Resource Management. Nguyen Ha Huy Cuong, PhD, working The University of Danang- College of Information Technology.

Ha Huy Cuong Nguyen obtained his doctorate in Computer Science / Resource Allocation Cloud Computing in 2017 from the University of Da Nang. He has published over 30 research papers. His main research interests include the resource allocation, detection, prevention, and avoidance of cloud computing and distributed systems. He serves as a technical committee program member, track chair, session chair and reviewer of many international conferences and journals. He is a guest editor journal “International Journal of Information Technology Project Management (IJITPM)” with Special Issue On: Recent Works on Management and Technological Advancement. He is editor/reviewer for Machine Learning & Networked Collaborative Engineering Journal, Asian Journal For Convergence In Technology (AJCT) Journal, and some international conferences.

Table of Contents

Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies

Chapter 2 Defense against the Survivability to Network Strategies

Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems

Chapter 4 Secure Channel Allocation in Cognitive Radio–Wireless Sensor Networks

Chapter 5 Security Issues in IoT Networks

Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario

Chapter 7 Design Principles and Privacy in Cloud Computing

Chapter 8 Big Data Analysis on Smart Tools and Techniques

Chapter 9 Lightweight Security Protocols for Blockchain Technology

Chapter 10 Privacy and Challenges to Data-Intensive Techniques

Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine

Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method

Chapter 13 Web-Based Smart Agriculture System

Index.

From the B&N Reads Blog

Customer Reviews