![Information Security Handbook](https://img.perlego.com/book-covers/3189109/9781000540567_300_450.webp)
Information Security Handbook
Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, João Manuel R.S. Tavares, Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, João Manuel R.S. Tavares
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Information Security Handbook
Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, João Manuel R.S. Tavares, Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, João Manuel R.S. Tavares
About This Book
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains.
Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts and serves as a manual for industry while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through the IoT ecosystem and implications to the real world and, at the same time, explains the concepts of IoT-related technologies, trends, and future directions.
University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful.
Frequently asked questions
Information
Table of contents
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Editor Biographies
- Contributors
- 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network
- 2 Software-Defined Networking (SDN) Security Concerns
- 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy Inference Logic
- 4 Security in Big Data
- 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security Infrastructure
- 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks
- 7 PDF Malware Classifiers – A Survey, Future Directions, and Recommended Methodology
- 8 Key Authentication Schemes for Medical Cyber Physical System
- 9 Ransomware Attack: Threats & Different Detection Technique
- 10 Security Management System (SMS)
- 11 Automatic Street Light Control Based on Pedestrian and Automobile Detection
- 12 Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona
- 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID
- Index