Emerging Trends in Cybersecurity Applications
Editat de Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhounen Limba Engleză Hardback – 19 noi 2022
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 694.27 lei 6-8 săpt. | |
Springer International Publishing – 19 noi 2023 | 694.27 lei 6-8 săpt. | |
Hardback (1) | 818.56 lei 3-5 săpt. | +34.32 lei 10-14 zile |
Springer International Publishing – 19 noi 2022 | 818.56 lei 3-5 săpt. | +34.32 lei 10-14 zile |
Preț: 818.56 lei
Preț vechi: 1023.20 lei
-20% Nou
Puncte Express: 1228
Preț estimativ în valută:
156.65€ • 163.20$ • 130.25£
156.65€ • 163.20$ • 130.25£
Carte disponibilă
Livrare economică 18 ianuarie-01 februarie 25
Livrare express 07-11 ianuarie 25 pentru 44.31 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031096396
ISBN-10: 3031096398
Pagini: 465
Ilustrații: XVII, 465 p. 170 illus., 127 illus. in color.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.86 kg
Ediția:1st ed. 2023
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3031096398
Pagini: 465
Ilustrații: XVII, 465 p. 170 illus., 127 illus. in color.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.86 kg
Ediția:1st ed. 2023
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
Introduction.- Cybersecurity Applications in Data Science.- Cybersecurity Applications in Internet of Things.- Cybersecurity Applications in Artificial Intelligence.- Cybersecurity Applications in Robotics.- Cybersecurity Applications in Web.- Cybersecurity Applications in High-Tech Systems.- Cybersecurity Applications in Cyber-Physical Systems.- Cybersecurity Applications in Mobile Devices.- Cybersecurity Applications in Digital Media.- Cybersecurity Applications in Cloud Computing.- Cybersecurity Applications in Distributed Systems.- Cybersecurity Applications in Vehicles.- Cybersecurity Applications in Supply Chain.- Cybersecurity Applications in Trustworthy Computing.- Cybersecurity Applications in Databases.- Cybersecurity Applications in Operating Systems.- Cybersecurity Applications in Software.- Cybersecurity Applications in Virtualization.- Cybersecurity Applications in Biometrics.- Cybersecurity Applications in Education.- Cybersecurity Applications in Blockchains.- Conclusion.
Notă biografică
Kevin Daimi received his Ph.D. from the University of Cranfield, England. He has a long academic and industry experience. His research interests include Computer and Network Security with emphasis on vehicle network security, Software Engineering, Data Science, and Computer Science and Software Engineering Education. He has published a number of papers on vehicle security. He is the editor of three books in cybersecurity; Computer and Network Security Essentials, Innovation in Cybersecurity Education, and Advances in Cybersecurity Management which were published by Springer. He has been chairing the annual International Conference on Security and Management (SAM) since 2012. He is also Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Kevin is a Senior Member of the Association for Computing Machinery (ACM), a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE), anda Fellow of the British Computer Society (BCS). He is the recipient of the Outstanding Achievement Award from the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’10) in Recognition and Appreciation of his Leadership, Service and Research Contributions to the Field of Network Security. He is currently Professor Emeritus of Computer Science and Software Engineering at the University of Detroit Mercy.
Abeer Alsadoon received her PhD from the University of Technology, Baghdad. She has published more than 100 papers in A and B ranking journals and has more than 100 conference papers published in different IEEE conferences. Abeer received twenty awards for teaching and research excellence from different Australian Universities. She has been recognized nationally as one out of five finalists for the prestigious 2019 Australian Women’s Agenda Leadership Awards in the category of Emerging Female Leader in the Government and Public Sector. She chairs of the 2022 International Conference on Health Informatics and Medical System (HIMS’22), Las Vegas, USA, and is Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Abeer has been chairing the Program and Technical Committees of the Annual IEEE International Conference on Innovative Technologies in Intelligent Systems & Industrial Application (CITISIA’20), Sydney, since 2020. She has more than 25 years of academic and industry experience. Abeer is currently a dean at Kent Institute Australia. As a leader, she oversees research, scholarly activities, and professional development for all disciplines at that institute.
Nour El Madhoun received her Master’s degree in Networks/Computer Science from Sorbonne Université/Télécom ParisTech in 2014, and her Ph.D. degree in Cybersecurity/Computer Science from Sorbonne Université in 2018. In 2019, she joined ISEP - Engineering School, Paris, as an Associate Professor of Cybersecurity in addition to overseeing the engineering cycle - Digital Security and Networks. In 2018, Nour gained industry experiencethrough working in a post-doctoral researcher at Orange Labs. At Sorbonne Université, she became an ATER in 2017. From 2020 to 2022, Nour joined, EPITA - Engineering school in Paris, as an Associate Professor of Cybersecurity and Blockchain. Her current research focuses on network security, cryptographic protocols, EMV payment, NFC technology, and blockchain and smart-contracts technologies. Nour is currently an Associate Professor of Computer Science, Cybersecurity and Blockchain at ISEP - Engineering School in Paris. She is also an Associate Researcher at Sorbonne Université (LIP6-PHARE Team).
Abeer Alsadoon received her PhD from the University of Technology, Baghdad. She has published more than 100 papers in A and B ranking journals and has more than 100 conference papers published in different IEEE conferences. Abeer received twenty awards for teaching and research excellence from different Australian Universities. She has been recognized nationally as one out of five finalists for the prestigious 2019 Australian Women’s Agenda Leadership Awards in the category of Emerging Female Leader in the Government and Public Sector. She chairs of the 2022 International Conference on Health Informatics and Medical System (HIMS’22), Las Vegas, USA, and is Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Abeer has been chairing the Program and Technical Committees of the Annual IEEE International Conference on Innovative Technologies in Intelligent Systems & Industrial Application (CITISIA’20), Sydney, since 2020. She has more than 25 years of academic and industry experience. Abeer is currently a dean at Kent Institute Australia. As a leader, she oversees research, scholarly activities, and professional development for all disciplines at that institute.
Cathryn Peoples received the B.A. degree (with honors and diploma in industrial studies) in business studies with computing, M.Sc. degree in telecommunications and internet systems, and Ph.D. degree in networking fromUlster University, U.K., in 2004, 2005, and 2009, respectively. She is currently employed by The Open University in the School of Computing and Communications as an Associate Lecturer. Cathryn is also employed on a part-time basis as a Research Associate at Ulster University working on Internet of Things (IoT) management. She became an Editor-in-Chief of the EAI Endorsed Transactions on Cloud Systems in January 2020. Her research interests include smart cities, green IT, network management, and secure software development.
Nour El Madhoun received her Master’s degree in Networks/Computer Science from Sorbonne Université/Télécom ParisTech in 2014, and her Ph.D. degree in Cybersecurity/Computer Science from Sorbonne Université in 2018. In 2019, she joined ISEP - Engineering School, Paris, as an Associate Professor of Cybersecurity in addition to overseeing the engineering cycle - Digital Security and Networks. In 2018, Nour gained industry experiencethrough working in a post-doctoral researcher at Orange Labs. At Sorbonne Université, she became an ATER in 2017. From 2020 to 2022, Nour joined, EPITA - Engineering school in Paris, as an Associate Professor of Cybersecurity and Blockchain. Her current research focuses on network security, cryptographic protocols, EMV payment, NFC technology, and blockchain and smart-contracts technologies. Nour is currently an Associate Professor of Computer Science, Cybersecurity and Blockchain at ISEP - Engineering School in Paris. She is also an Associate Researcher at Sorbonne Université (LIP6-PHARE Team).
Textul de pe ultima copertă
This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional developmentefforts and to students as a supplement to their cybersecurity courses.
Caracteristici
Provides a professional resource for educators and practitioners on cybersecurity applications materials Introduces various techniques, methods, and approaches adopted by cybersecurity applications experts Includes a detailed explanation of the cybersecurity application concepts that are pertinently reinforced by practical examples