Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation: Advanced Sciences and Technologies for Security Applications
Editat de Hamid Jahankhani, Gordon Bowen, Mhd Saeed Sharif, Osama Hussienen Limba Engleză Hardback – 18 apr 2024
Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments’ approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.
Din seria Advanced Sciences and Technologies for Security Applications
- 20% Preț: 934.69 lei
- 18% Preț: 738.20 lei
- Preț: 280.00 lei
- 20% Preț: 1273.74 lei
- 20% Preț: 994.92 lei
- 18% Preț: 791.88 lei
- 20% Preț: 991.60 lei
- 18% Preț: 969.61 lei
- 15% Preț: 704.36 lei
- 15% Preț: 704.36 lei
- 15% Preț: 644.95 lei
- 20% Preț: 1162.37 lei
- 17% Preț: 491.10 lei
- 15% Preț: 643.65 lei
- 20% Preț: 889.10 lei
- 20% Preț: 936.37 lei
- 15% Preț: 649.22 lei
- 5% Preț: 672.98 lei
- 20% Preț: 1051.84 lei
- 18% Preț: 783.98 lei
- 18% Preț: 1223.88 lei
- 20% Preț: 480.04 lei
- 15% Preț: 648.42 lei
- 18% Preț: 1224.36 lei
- Preț: 381.43 lei
- 15% Preț: 586.38 lei
- 20% Preț: 937.81 lei
- 20% Preț: 1068.42 lei
- 18% Preț: 734.59 lei
- 18% Preț: 1120.18 lei
- 24% Preț: 590.40 lei
- 18% Preț: 1007.17 lei
- 24% Preț: 815.81 lei
- 24% Preț: 747.51 lei
- 20% Preț: 937.81 lei
- 18% Preț: 721.30 lei
- 15% Preț: 646.75 lei
- 18% Preț: 794.07 lei
- 18% Preț: 738.06 lei
- Preț: 388.13 lei
- 18% Preț: 778.01 lei
- 24% Preț: 749.10 lei
Preț: 1166.01 lei
Preț vechi: 1457.52 lei
-20% Nou
Puncte Express: 1749
Preț estimativ în valută:
223.13€ • 233.25$ • 188.56£
223.13€ • 233.25$ • 188.56£
Carte tipărită la comandă
Livrare economică 06-20 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031522710
ISBN-10: 3031522710
Ilustrații: VI, 326 p. 62 illus., 59 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.64 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Advanced Sciences and Technologies for Security Applications
Locul publicării:Cham, Switzerland
ISBN-10: 3031522710
Ilustrații: VI, 326 p. 62 illus., 59 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.64 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Advanced Sciences and Technologies for Security Applications
Locul publicării:Cham, Switzerland
Cuprins
1. Cybersecurity Strategy.- 2. Artificial Intelligence Innovations.- 3. Cybersecurity and Healthcare.- 4. Artificial Intelligence Implementation.- 5. Emerging technologies to manage cybersecurity.- 6. Artificial Intelligence and Healthcare.- 7. Intelligent Decision making within cybersecurity.- 8. SDGs and CSR to embed cybersecurity in society.- 9. Cybersecurity leadership - ethical leadership.- 10. Government role and policies for cybersecurity - evaluation of the main governments approach.- 11. Countering cybersecurity threats.- 12. Impact case analysis of 2-3 cybersecurity cases.- 13. Cybersecurity governance.- 14. Legal perspective of cybersecurity laws.- 14. Cybersecurity and database integrity.- 15. Building international alliances in cybersecurity - political and regulatory requirements.- 16. Cybersecurity and behavioural changes.
Notă biografică
Professor Hamid Jahankhani has taught at both the undergraduate and postgraduate levels, full and part-time and supervised and examined research students at the MPhil and PhD levels and Doctorate in Professional Studies (DProf). Hamid’s teaching has covered a broad range of computing modules in particular information security management, information security risk and audit, digital forensics, systems design and development, telecommunications and networking, and computer systems. Hamid’s principal research area for a number of years has been in the field of information security management and digital forensics.
Dr. Gordon Bowen has a Doctorate in Business (University of Hull) and is a chartered marketer from the Chartered Institute of Marketing (UK). He is an associate professor in Management at Anglia Ruskin University and works as an associate lecturer at various universities and higher education institutions, including Warwick University, University of Gloucestershire, Northumbria University, Cumbria University, Regent’s University London, Ulster University, University of Hertfordshire, University of Wales Trinity St. David, and Grenoble Graduate Business School. His research interests are strategy, marketing, digital marketing, and SMEs, and he supervises PhD and DBA students in these areas. Gordon has many completions at PhD and DBA. Gordon has reviewed articles for journals and conferences including MDPI Sustainability, European Academy of Management Conference, and International Journal of Technology Management. He has published 5 edited books on social media and cybersecurity and AI, which are recognised internationally.
Dr. Saeed Sharif is the leader of Intelligent Technologies Research Group and a course leader for MSc Computer Science with Industrial Placement at the School of Architecture, Computing, and Engineering. He has a PhD in artificial intelligence from Brunel University London. He is working closelypolicy makers nationally and internationally to improve the strategic systems. He has led the research development of different research projects associated with many industries. He has developed his research with the goal of improving the effectiveness, and efficiency of medical and health care systems. Dr. Saeed has published a significant number of research articles in highly reputable journals, international conferences, and book chapters, such as Elsevier Applied Soft Computing, Computer Methods and Programs in Biomedicine, IEEE Access, etc.
Osama Hussein is a security engineer and cybersecurity graduate student at Northumbria University. He holds an ISC^2 CC certificate and is an IBM AI Associate with a strong academic background in network engineering from the German University in Cairo. His research interests include post-quantum secure network protocols, information governance and cyber security, wireless network security, ethical hacking, and information assurance and risk management. As a security engineer, he has experience designing and implementing network security infrastructure, including VPN tunnels, ACLs, firewalls, intrusion prevention and detection systems, antivirus, and SIEM tools. He is skilled in device security hardening, internal and external routing, and site administration and has worked with Cisco and FortiGate devices.
Dr. Gordon Bowen has a Doctorate in Business (University of Hull) and is a chartered marketer from the Chartered Institute of Marketing (UK). He is an associate professor in Management at Anglia Ruskin University and works as an associate lecturer at various universities and higher education institutions, including Warwick University, University of Gloucestershire, Northumbria University, Cumbria University, Regent’s University London, Ulster University, University of Hertfordshire, University of Wales Trinity St. David, and Grenoble Graduate Business School. His research interests are strategy, marketing, digital marketing, and SMEs, and he supervises PhD and DBA students in these areas. Gordon has many completions at PhD and DBA. Gordon has reviewed articles for journals and conferences including MDPI Sustainability, European Academy of Management Conference, and International Journal of Technology Management. He has published 5 edited books on social media and cybersecurity and AI, which are recognised internationally.
Dr. Saeed Sharif is the leader of Intelligent Technologies Research Group and a course leader for MSc Computer Science with Industrial Placement at the School of Architecture, Computing, and Engineering. He has a PhD in artificial intelligence from Brunel University London. He is working closelypolicy makers nationally and internationally to improve the strategic systems. He has led the research development of different research projects associated with many industries. He has developed his research with the goal of improving the effectiveness, and efficiency of medical and health care systems. Dr. Saeed has published a significant number of research articles in highly reputable journals, international conferences, and book chapters, such as Elsevier Applied Soft Computing, Computer Methods and Programs in Biomedicine, IEEE Access, etc.
Osama Hussein is a security engineer and cybersecurity graduate student at Northumbria University. He holds an ISC^2 CC certificate and is an IBM AI Associate with a strong academic background in network engineering from the German University in Cairo. His research interests include post-quantum secure network protocols, information governance and cyber security, wireless network security, ethical hacking, and information assurance and risk management. As a security engineer, he has experience designing and implementing network security infrastructure, including VPN tunnels, ACLs, firewalls, intrusion prevention and detection systems, antivirus, and SIEM tools. He is skilled in device security hardening, internal and external routing, and site administration and has worked with Cisco and FortiGate devices.
Textul de pe ultima copertă
This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes – which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies.
Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments’ approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.
Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments’ approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.
Caracteristici
Links the diverse strategic aspects of cyber security strategy in one place Develops the government themes and establishes the implementation issues and potential solutions to overcome them Is a showcase for other governments