Cantitate/Preț
Produs

Blockchain Technology for Cyber Defense, Cyber Security, and Countermeasures: Techniques, Solutions, and Applications

Editat de Naresh Kshetri, Purnendu Shekhar Pandey, Mohiuddin Ahmed
en Limba Engleză Hardback – 17 ian 2025
The rapid increase in IT infrastructure and presence in cyber space has given rise to enormous chances of security breach. Cybersecurity is one of the burning issues in today’s modern world and the lack of cybersecurity policy and cyber strategy might make the situation vulnerable. Today blockchain technology has almost covered every sector from business to data security. This book is written for all enthusiastic and cyber professionals in this new era of blockchain technology. Blockchain has already proved its versatile nature as adopted by several governments and tech giants from all over the world. Any anonymous user can trust another anonymous user in the cyber world with the authentication and validation via blockchain technology.

Blockchain governance provides a more distributed diffusion of authority in which authentication sources are the individual themselves. This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares that are increasing every second. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks as a part of cybersecurity, information security and cyber defense initiative with several countermeasures and defense strategies in the web. Each chapter of the book provide excellent tools and techniques for the burning and challenging issues in today’s modern cyber (and zero trust) world.
Citește tot Restrânge

Preț: 61504 lei

Preț vechi: 90070 lei
-32% Nou

Puncte Express: 923

Preț estimativ în valută:
11772 12659$ 9812£

Carte nepublicată încă

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781032583037
ISBN-10: 1032583037
Pagini: 312
Ilustrații: 140
Dimensiuni: 156 x 234 mm
Ediția:1
Editura: CRC Press
Colecția CRC Press
Locul publicării:Boca Raton, United States

Public țintă

Academic and Postgraduate

Cuprins

1. Use of Blockchain technology in Digital Forensics: Where and How? 2. Leveraging Blockchain technology for making Secure IoT Networks. 3. Blockchain technology: Aiding transformation in Healthcare & Medical Industry. 4. Blockchain technology strategy for Cyber Attack and Cyber crime. 5. Blockchain technology for Healthcare and Self-sovereign identity. 6. BCT4C4: Blockchain technology for Cybersecurity, cyber data, & cyber communication in today’s Cyber world. 7. Blockchain technology for Cyber defense, Cyber security: A systematic review. 8. webCyberBlock: Cybersecurity & cyber ethics via Blockchain technology - Need for web security, software practices, & end-user cyber education. 9. A study on Machine Learning and Blockchain based techniques for transparent VNF testing for 5G & B5G networks. 10. Blockchain technology solutions for Smart Contracts. 11. Blockchain technology applications for eGovernance & trust. 12. Blockchain based Secure digital library system. 13. SHSBchain: Blockchain technology solutions for Smart Homes & Smart Business. 14. blockDADS: Blockchain Technology for Data Analytics and Data Security - Applications and Solutions. 15. ISNDchain: Blockchain technology based secure Informations Systems and National Defense.



Notă biografică

Naresh Kshetri is currently an Assistant Professor of Cybersecurity at the Department of Math, CS, and IT, Lindenwood University. He completed his PhD (Computer Science) from University of Missouri – St. Louis (UMSL), graduated with an MS (Cybersecurity) from Webster University, and also earned an MCA (Computer Applications) degree from University of Allahabad. With more than nine years of experience and research interests in Cybersecurity, Blockchain technology, he has published in various journals, conferences, and book chapters. His research is funded by the University of Missouri – St. Louis and the Lindenwood University. Dr. Naresh has taught various CS courses at both the undergraduate and graduate levels. His teaching horizon expands from high school level teaching to university level teaching.

Purnendu Shekhar Pandey has done his Ph.D. from IIIT-A (Indian Institute of Information Technology, Allahabad) in Information Technology. He worked in various government and private institutions where he taught both PG and UG students. He is currently working as an Associate Professor in the Department of Computer Science & Engineering, KIET, Group of Institutions, Ghaziabad, U.P. He has more than eleven years of experience and research interests in the field of IoT, Machine Learning, Cyber-Security, Sensor Networks, Network Coding, D2D assisted Networks, etc. He has published various papers in SCI and ESCI Journals, top-notch conferences like ANTS, FRUCT, NOPE, CCNC (h-index> 25), and reviewer in various peer-reviewed SCI journals. He has given various talks on IoT and discrete process modeling, machine learning in industrial IoT, etc. in various national and international conferences and has hosted various session chairs at various international conferences.

Mohiuddin Ahmed has been educating the next generation of cyber leaders and researching to disrupt the cybercrime ecosystem. His research is focused on ensuring national security and defending against ransomware attacks. Mohiuddin has edited several books and contributed articles to The Conversation. His research publications in reputed venues attracted more than 2900 citations and have been listed in the world's top 2% scientists for the 2020-2022 citation impact. Mohiuddin secured several external and internal grants worth more than $1.4 Million and has been collaborating with academia and industry. He has been regularly invited to speak at international conferences, public organizations, and interviewed by the media for expert opinion.




Descriere

This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks as a part of cybersecurity, information security and cyber defense initiative