![Information Security Handbook](https://img.perlego.com/book-covers/3189109/9781000540567_300_450.webp)
Information Security Handbook
Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, JoĂŁo Manuel R.S. Tavares, Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, JoĂŁo Manuel R.S. Tavares
- 248 pages
- English
- ePUB (adapté aux mobiles)
- Disponible sur iOS et Android
Information Security Handbook
Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, JoĂŁo Manuel R.S. Tavares, Noor Zaman Jhanjhi, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, JoĂŁo Manuel R.S. Tavares
Ă propos de ce livre
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains.
Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts and serves as a manual for industry while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through the IoT ecosystem and implications to the real world and, at the same time, explains the concepts of IoT-related technologies, trends, and future directions.
University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful.
Foire aux questions
Informations
Table des matiĂšres
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Editor Biographies
- Contributors
- 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network
- 2 Software-Defined Networking (SDN) Security Concerns
- 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy Inference Logic
- 4 Security in Big Data
- 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security Infrastructure
- 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks
- 7 PDF Malware Classifiers â A Survey, Future Directions, and Recommended Methodology
- 8 Key Authentication Schemes for Medical Cyber Physical System
- 9 Ransomware Attack: Threats & Different Detection Technique
- 10 Security Management System (SMS)
- 11 Automatic Street Light Control Based on Pedestrian and Automobile Detection
- 12 Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona
- 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID
- Index