Buch, Englisch, 233 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 541 g
Reihe: Springer Tracts in Electrical and Electronics Engineering
Modern Trends and Challenges
Buch, Englisch, 233 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 541 g
Reihe: Springer Tracts in Electrical and Electronics Engineering
ISBN: 978-981-97-0406-4
Verlag: Springer Nature Singapore
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
Weitere Infos & Material
Zero Trust Security Architecture for Digital Privacy in Healthcare.- Security issues and challenges in deploying a CPS using WSN.- Firewall: A Vital Constituent of Network Security.- Exploring the Landscape of Password Managers for Individual Users through Innovative Solution.- Review on Wi-Fi attacks and Detection methods.- Privacy Preserving Spatio-Temporal Attribute Based Access Control for Collaborative E-Healthcare.- Advances in Differential Privacy and Differentially Private Machine Learning.- Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay Networks.- MRMM based keystream generators for information security.