This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Kevin Daimi received his Ph.D. from the University of Cranfield, England. He has a long academic and industry experience. His research interests include Computer and Network Security with emphasis on vehicle network security, Software Engineering, Data Science, and Computer Science and Software Engineering Education. He has published a number of papers on vehicle security. He is the editor of three books in cybersecurity; Computer and Network Security Essentials, Innovation in Cybersecurity Education, and Advances in Cybersecurity Management which were published by Springer. He has been chairing the annual International Conference on Security and Management (SAM) since 2012. He is also Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Kevin is a Senior Member of the Association for Computing Machinery (ACM), a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE), anda Fellow of the British Computer Society (BCS). He is the recipient of the Outstanding Achievement Award from the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’10) in Recognition and Appreciation of his Leadership, Service and Research Contributions to the Field of Network Security. He is currently Professor Emeritus of Computer Science and Software Engineering at the University of Detroit Mercy.
Abeer Alsadoon received her PhD from the University of Technology, Baghdad. She has published more than 100 papers in A and B ranking journals and has more than 100 conference papers published in different IEEE conferences. Abeer received twenty awards for teaching and research excellence from different Australian Universities. She has been recognized nationally as one out of five finalists for the prestigious 2019 Australian Women’s Agenda Leadership Awards in the category of Emerging Female Leader in the Government and Public Sector. She chairs of the 2022 International Conference on Health Informatics and Medical System (HIMS’22), Las Vegas, USA, and is Program Chair of the 2022 International Conference on Innovations in Computing Research (ICR’22), Athens, Greece. Abeer has been chairing the Program and Technical Committees of the Annual IEEE International Conference on Innovative Technologies in Intelligent Systems & Industrial Application (CITISIA’20), Sydney, since 2020. She has more than 25 years of academic and industry experience. Abeer is currently a dean at Kent Institute Australia. As a leader, she oversees research, scholarly activities, and professional development for all disciplines at that institute.Nour El Madhoun received her Master’s degree in Networks/Computer Science from Sorbonne Université/Télécom ParisTech in 2014, and her Ph.D. degree in Cybersecurity/Computer Science from Sorbonne Université in 2018. In 2019, she joined ISEP - Engineering School, Paris, as an Associate Professor of Cybersecurity in addition to overseeing the engineering cycle - Digital Security and Networks. In 2018, Nour gained industry experiencethrough working in a post-doctoral researcher at Orange Labs. At Sorbonne Université, she became an ATER in 2017. From 2020 to 2022, Nour joined, EPITA - Engineering school in Paris, as an Associate Professor of Cybersecurity and Blockchain. Her current research focuses on network security, cryptographic protocols, EMV payment, NFC technology, and blockchain and smart-contracts technologies. Nour is currently an Associate Professor of Computer Science, Cybersecurity and Blockchain at ISEP - Engineering School in Paris. She is also an Associate Researcher at Sorbonne Université (LIP6-PHARE Team).
This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional developmentefforts and to students as a supplement to their cybersecurity courses.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 17,13 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 8,09 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiDa: Speedyhen, London, Regno Unito
Condizione: NEW. Codice articolo NW9783031096396
Quantità: 3 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo GB-9783031096396
Quantità: 3 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo GB-9783031096396
Quantità: 3 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 45180189-n
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783031096396_new
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 45180189-n
Quantità: 3 disponibili
Da: moluna, Greven, Germania
Condizione: New. This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applicat. Codice articolo 601557196
Quantità: 3 disponibili
Da: Chiron Media, Wallingford, Regno Unito
Hardcover. Condizione: New. Codice articolo 6666-GRD-9783031096396
Quantità: 3 disponibili
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Condizione: New. Codice articolo V9783031096396
Quantità: 3 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Hardcover. Condizione: Brand New. 482 pages. 9.25x6.10x1.30 inches. In Stock. Codice articolo __3031096398
Quantità: 1 disponibili