• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Data Protection in a Post-Pandemic Society: Laws, Regulations, Best Practices and Recent Solutions » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2948695]
• Literatura piękna
 [1824038]

  więcej...
• Turystyka
 [70868]
• Informatyka
 [151073]
• Komiksy
 [35227]
• Encyklopedie
 [23181]
• Dziecięca
 [621575]
• Hobby
 [138961]
• AudioBooki
 [1642]
• Literatura faktu
 [228651]
• Muzyka CD
 [371]
• Słowniki
 [2933]
• Inne
 [445341]
• Kalendarze
 [1243]
• Podręczniki
 [164416]
• Poradniki
 [479493]
• Religia
 [510449]
• Czasopisma
 [502]
• Sport
 [61384]
• Sztuka
 [243086]
• CD, DVD, Video
 [3417]
• Technologie
 [219673]
• Zdrowie
 [100865]
• Książkowe Klimaty
 [124]
• Zabawki
 [2168]
• Puzzle, gry
 [3372]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7838]
Kategorie szczegółowe BISAC

Data Protection in a Post-Pandemic Society: Laws, Regulations, Best Practices and Recent Solutions

ISBN-13: 9783031340055 / Angielski

Chaminda Hewage;Yogachandran Rahulamathavan;Deepthi Ratnayake
Data Protection in a Post-Pandemic Society: Laws, Regulations, Best Practices and Recent Solutions Chaminda Hewage Yogachandran Rahulamathavan Deepthi Ratnayake 9783031340055 Springer International Publishing AG - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Data Protection in a Post-Pandemic Society: Laws, Regulations, Best Practices and Recent Solutions

ISBN-13: 9783031340055 / Angielski

Chaminda Hewage;Yogachandran Rahulamathavan;Deepthi Ratnayake
cena 722,88
(netto: 688,46 VAT:  5%)

Najniższa cena z 30 dni: 655,41
Termin realizacji zamówienia:
ok. 22 dni roboczych.

Darmowa dostawa!
inne wydania

This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g. Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.

Kategorie:
Informatyka, Bezpieczeństwo
Kategorie BISAC:
Computers > Security - General
Wydawca:
Springer International Publishing AG
Język:
Angielski
ISBN-13:
9783031340055

Chapter. 1. Post-Covid-19 Metaverse Cybersecurity and Data Privacy-Present and Future Challenges

Chapter. 2. Keeping it Low-Key: Modern-day approaches to Privacy-Preserving Machine Learning
Chapter. 3. Security Analysis of Android Hot Cryptocurrency Wallet Applications
Chapter. 4. Exploring the Opportunities of Applying Digital Twins for Intrusion Detection in Industrial Control Systems of Production and Manufacturing – A Systematic Review
Chapter. 5. Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People’s Right to Privacy
Chapter. 6. Federated Learning: Data privacy and cyber security in edge-based machine learning Mobile Malware Detection Using Consortium
Chapter. 7. Emerging Computer Security Laws and Regulations across the Globe: A Comparison between Sri Lankan and Contemporary International Computer Acts
Chapter. 8. Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities

​Chaminda Hewage is a Reader (Associate Professor) of Data Security in the Cardiff School of Technologies at Cardiff Metropolitan University, UK where he is also the Associate Dean Research for the school. He is the founder and director of Cybersecurity and Information Networks Centre (CINC). He received a B.Sc. Engineering (First Class Honours Degree) in Electrical and Information Engineering from the Faculty of Engineering, University of Ruhuna (Sri Lanka) in 2004 and a Ph.D. in Multimedia Communications from the University of Surrey (UK) in 2009. He was awarded the Gold Medal for best performance in Engineering (2014) by the University of Ruhuna for his achievements in undergraduate studies at the General Convocation held in 2004. After graduation, he joined Sri Lanka Telecom PLC (Sri Lanka) as a Telcommunication Engineer (2004). In September 2005, he was awarded the Overseas Research Scholarships (ORS) scholarship by the Higher Education Funding Council of England (Universities UK) to pursue his Ph.D. at the University of Surrey, UK. Upon completion of his PhD, he works as a researcher at the University of Surrey, UK and Kingston University, London, UK. In 2015, he joined Cardiff Metropolitan University, UK as a Senior Lecturer. In 2014, he received a Post-Graduate Certification in Higher Education (HE) Teaching and Learning from Kingston University – London. He is a Fellow of the Higher Education Academy (HEA), UK. He is a Senior member of the IEEE and Member of the Chartered Institute of Information Security (CIISec). 


Yogachandran Rahulamathavan is a Senior Lecturer and the Programme Director for MSc Cyber Security and Data Analytics at Loughborough University’s London Campus in the UK. Yoga obtained his PhD degree from Loughborough University in mathematical optimisation techniques for information processing in 2012. His research interest is in developing novel security protocols to advance machine learning techniques to solve complex privacy issues. Currently focussing on postquantum encryption techniques to develop privacy-preserving machine learning algorithms. Currently, Dr Rahul coordinates a UK-India project between Loughborough University London, IIT Kharagpur, India and City, University of London. He is a Senior Member of IEEE and an Associate Editor for the IEEE Access journal.

Dr. Deepthi Ratnayake is a university academic, a researcher, and an author with nearly 30 years' experience in industry, defence and academia in the areas of cyber security, networking, and information systems management. She currently serves as a Senior Lecturer in Computer Science (Cyber Security and Networks) and is a member of Cyber Security Research Group within the School of Physics, Engineering and Computer Science (PECS) at the University of Hertfordshire, UK. Deepthi is also an executive officer of Information Security Specialist Group of British Computer Society (BCS-ISSG), an associate editor of Information Security Journal: A Global Perspective, and a Cyber Security Columnist at BCS ITNow quarterly magazine. Deepthi obtained her PhD in Probe Request Attack Detection in Wireless LANs using Intelligent Techniques. Her research interests are intruder detection and prevention using intelligent techniques, ISM automation and security in humanoids. She has delivered several academic and professional talks, has published in refereed national/international conferences and has authored journal articles of high impact. She also regularly contributes to policy advisory and reaches wider audiences through her articles on current hot topics. She is also keen on bridging the gap between business needs and cyber security education and cyber-crime prevention. She has organised many collaborative events that included participation of university academics & students, professional bodies, industry and government agencies.

This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. 

Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g., Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). 

In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.

 

 

 

 



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia