• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Emerging Trends in Cybersecurity Applications » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Emerging Trends in Cybersecurity Applications

ISBN-13: 9783031096396 / Angielski / Twarda / 2022 / 465 str.

Kevin Daimi; Abeer Alsadoon; Cathryn Peoples
Emerging Trends in Cybersecurity Applications Kevin Daimi Abeer Alsadoon Cathryn Peoples 9783031096396 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Emerging Trends in Cybersecurity Applications

ISBN-13: 9783031096396 / Angielski / Twarda / 2022 / 465 str.

Kevin Daimi; Abeer Alsadoon; Cathryn Peoples
cena 645,58
(netto: 614,84 VAT:  5%)

Najniższa cena z 30 dni: 578,30
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!
inne wydania

This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.

This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Telecommunications
Technology & Engineering > Electrical
Technology & Engineering > Engineering (General)
Wydawca:
Springer
Język:
Angielski
ISBN-13:
9783031096396
Rok wydania:
2022
Dostępne języki:
Ilość stron:
465
Waga:
0.84 kg
Wymiary:
23.39 x 15.6 x 2.69
Oprawa:
Twarda
Dodatkowe informacje:
Wydanie ilustrowane

1. Introduction

2. Cybersecurity Applications in Data Science
3. Cybersecurity Applications in Internet of Things
4. Cybersecurity Applications in Artificial Intelligence
5. Cybersecurity Applications in Robotics
6. Cybersecurity Applications in Web
7. Cybersecurity Applications in High-Tech Systems
8. Cybersecurity Applications in Cyber-Physical Systems
9. Cybersecurity Applications in Mobile Devices
10. Cybersecurity Applications in Digital Media
11. Cybersecurity Applications in Cloud Computing
12. Cybersecurity Applications in Distributed Systems
13. Cybersecurity Applications in Vehicles
14. Cybersecurity Applications in Supply Chain
15. Cybersecurity Applications in Trustworthy Computing
16. Cybersecurity Applications in Databases
17. Cybersecurity Applications in Operating Systems
18. Cybersecurity Applications in Software
19. Cybersecurity Applications in Virtualization
20. Cybersecurity Applications in Biometrics
21. Cybersecurity Applications in Education
22. Cybersecurity Applications in Blockchains
23. Conclusion.

Kevin Daimi received his Ph.D. from the University of Cranfield, England.  He has a long academic and industry experience.  His research interests include Computer and Network Security with emphasis on vehicle network security, Software Engineering, Data Science, and Computer Science and Software Engineering Education.  He has published a number of papers on vehicle security. He is the editor of three books in cybersecurity; Computer and Network Security Essentials, Innovation in Cybersecurity Education, and Advances in Cybersecurity Management which were published by Springer. He has been chairing the annual International Conference on Security and Management (SAM) since 2012. He is also Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Kevin is a Senior Member of the Association for Computing Machinery (ACM), a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE), and a Fellow of the British Computer Society (BCS). He is the recipient of the Outstanding Achievement Award from the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’10) in Recognition and Appreciation of his Leadership, Service and Research Contributions to the Field of Network Security. He is currently Professor Emeritus of Computer Science and Software Engineering at the University of Detroit Mercy.

Abeer Alsadoon received her PhD from the University of Technology, Baghdad.  She has published more than 100 papers in A and B ranking journals and has more than 100 conference papers published in different IEEE conferences.  Abeer received twenty awards for teaching and research excellence from different Australian Universities. She has been recognized nationally as one out of five finalists for the prestigious 2019 Australian Women’s Agenda Leadership Awards in the category of Emerging Female Leader in the Government and Public Sector. She chairs of the 2022 International Conference on Health Informatics and Medical System (HIMS’22), Las Vegas, USA, and is Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Abeer has been chairing the Program and Technical Committees of the Annual IEEE International Conference on Innovative Technologies in Intelligent Systems & Industrial Application (CITISIA’20), Sydney, since 2020. She has more than 25 years of academic and industry experience. Abeer is currently a dean at Kent Institute Australia. As a leader, she oversees research, scholarly activities, and professional development for all disciplines at that institute.

Cathryn Peoples received the B.A. degree (with honors and diploma in industrial studies) in business studies with computing, M.Sc. degree in telecommunications and internet systems, and Ph.D. degree in networking from Ulster University, U.K., in 2004, 2005, and 2009, respectively. She is currently employed by The Open University in the School of Computing and Communications as an Associate Lecturer. Cathryn is also employed on a part-time basis as a Research Associate at Ulster University working on Internet of Things (IoT) management. She became an Editor-in-Chief of the EAI Endorsed Transactions on Cloud Systems in January 2020. Her research interests include smart cities, green IT, network management, and secure software development.

Nour El Madhoun received her Master’s degree in Networks/Computer Science from Sorbonne Université/Télécom ParisTech in 2014, and her Ph.D. degree in Cybersecurity/Computer Science from Sorbonne Université in 2018. In 2019, she joined ISEP - Engineering School, Paris, as an Associate Professor of Cybersecurity in addition to overseeing the engineering cycle - Digital Security and Networks. In 2018, Nour gained industry experience through working in a post-doctoral researcher at Orange Labs. At Sorbonne Université, she became an ATER in 2017. From 2020 to 2022, Nour joined, EPITA - Engineering school in Paris, as an Associate Professor of Cybersecurity and Blockchain. Her current research focuses on network security, cryptographic protocols, EMV payment, NFC technology, and blockchain and smart-contracts technologies. Nour is currently an Associate Professor of Computer Science, Cybersecurity and Blockchain at ISEP - Engineering School in Paris. She is also an Associate Researcher at Sorbonne Université (LIP6-PHARE Team).

This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.

Daimi, Kevin KEVIN DAIMI is a full professor and director of Co... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia