feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_BV049625876
    Format: xiv, 313 Seiten : , Illustrationen, Diagramme.
    Edition: First edition
    ISBN: 978-1-032-51899-2 , 978-1-032-51900-5
    Content: This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-003-40436-1 10.1201/9781003404361
    Language: English
    Subjects: Computer Science
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949707878202882
    Format: 1 online resource
    ISBN: 1003826423 , 9781003826422 , 9781003404361 , 1003404367 , 9781003826408 , 1003826407
    Content: This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES Highlights innovative principles and practices using next generation computing technologies based cybersecurity Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity Offers an overview of theoretical, practical, simulation concepts of cybersecurity
    Note: Cyber security : future trends & solutions / Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, Gowhar Mohi ud din Dar -- Security & intelligent management : survey / Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, Muhammad Allah Rakha -- Comparative analysis of machine and deep learning for cyber security / Hafsa Maryam, Syeda Zillay Nain Zukhraf, Rehmat Ullah -- AI-based secure wireless communication technologies & cyber threats for IoT networks / Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, Salma El Hajjami -- Cyber threat actors review : examining the tactics and motivations of adversaries in the cyber landscape / Zakaria Abou El Houda -- Layer-based security threats in IoT networks / Muna Muhammad, Ahthasham Sajid, Hira Arshad -- Intrusion detection system using AI and machine learning algorithm / Muhammad Tehmasib Ali Tashfeen -- Signature-based intrusion detection system for IoT / Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, Muhammad Fayaz -- Hybrid model for IoT enabled intelligent towns using MQTT-IoT-IDS2020 dataset / Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Muhammad Yaseen Ayub -- Cyber security for edge fog computing applications / Hanane Lamaazi -- Cyber attacks against intelligent transportation systems / Muhammad Usama, Ubaid Ullah, Ahthasham Sajid -- Intelligent transportation systems for IoT-based UAV-networks / Mamoona Jamil, Usman Haider, Inam Ullah Khan, Tarandeep Kaur Bhatia -- Cyber attack detection analysis using machine learning for IoT based UAV network / Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub, Muhammad Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, Inam Ullah Khan -- Blockchain solutions for cyber criminals / Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, Bhupendra Kumar Soni -- Blockchain security measures to combat cybercrime / Rahmeh Ibrahim, Qasem Abu Al-Haija -- AI classification algorithms for human activities recognition system with cyber security perspective / Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman khan, Inam Ullah Khan.
    Additional Edition: Print version: Ullah Khan, Inam Ullah Khan Cyber Security for Next-Generation Computing Technologies Milton : Taylor & Francis Group,c2024 ISBN 9781032519005
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages