Cyberology - Husain, Mohd. Shahid; Faisal, Mohammad; Sadia, Halima;(ed.) - Prospero Internet Bookshop

 
Product details:

ISBN13:9781032526683
ISBN10:1032526688
Binding:Hardback
No. of pages:380 pages
Size:234x156 mm
Language:English
Illustrations: 74 Illustrations, black & white; 8 Halftones, black & white; 66 Line drawings, black & white; 29 Tables, black & white
700
Category:

Cyberology

An Optimized Approach to the Cyber-World
 
Edition number: 1
Publisher: Chapman and Hall
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 155.00
Estimated price in HUF:
78 445 HUF (74 710 HUF + 5% VAT)
Why estimated?
 
Your price:

70 601 (67 239 HUF + 5% VAT )
discount is: 10% (approx 7 845 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Short description:

This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cyber security, including cybercrime laws, cyberbullying, and emerging technologies. 

Long description:
This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cybersecurity, including cybercrime laws, cyberbullying, and emerging technologies. It discusses challenges in detecting and preventing cyber threats and analyzes trends in cyber warfare and resilience. This book serves as a resource for understanding the complex relationship between technology and society, equipping readers with the knowledge needed to navigate the evolving cyber landscape. It is for scholars, students, and professionals interested in cybersecurity and challenges. This book

? introduces the fundamental principles and theories of cybersecurity, focusing on the relationship between humans and technology;


? details various cyber threats affecting the digital world, healthcare, and agriculture, emphasizing their real-world implications;


? discusses issues like cyberbullying, threats in cloud computing, and vulnerabilities in cyber-physical systems;


? examines the difficulties in detecting cybercrimes, addressing advanced persistent threats, and fostering cyber resilience;


? analyzes current trends in cyber warfare and terrorism, providing insights into new security challenges.

Table of Contents:

1. Changing Paradigm in AI Application and Its Impact on Cybercrime: Review of Major Global Events 2. Transformative Impact: Social Robots Redefining Industries and Services 3. Strategies for Cyber-Resilience: Combatting Advanced Persistent Threats in the Digital Age 4. Unveiling the Digital Trails: A Survey of Contemporary Digital Forensics Tools and Techniques 5. Issues and Challenges in Emerging Cyber Forensics and Traditional Cyber Forensics Methods 6. Optimized Approaches for Cyber Forensics Tools Applications Case Studies 7. A Study of Cyber Threats and Security Frameworks in Cloud Computing 8. Cyberthreats in Cloud Computing Unveiling Vulnerabilities and How to Strengthen the Defence 9. A Comprehensive Analysis of Vulnerabilities and Cybersecurity Issues for Digital Agriculture and Food Industry 10. Unveiling critical success factor of the implementation of Zero Trust Cybersecurity in Food industry from a stage of change perspective 11. Understanding and Mitigating Cyber Threats in smart Fruit Crops Safety: An Analysis of Vulnerability and Best Practices for Securing Agricultural Systems 12. Cyber Resilience in a Digital World: Securing Healthcare, Agriculture, and Food Industry Against Emerging Threats 13. Cyberbullying - Understanding, Preventing, and Addressing Online Harassment 14. The Perils of Cyberbullying on Social Media: Detection and Prevention with Artificial Intelligence 15. Cybersecurity Challenges and Countermeasures in Smart Cities for Sustainable Environment Development: A Comprehensive Analysis of Threats and Resilience Strategies 16. Cyber Risk Management in IoT Security Technologies 17. Landscape of Cyber Terrorism on Internet and AI Powered Countermeasures 18. Hybrid secure clustered nature-inspired decision support system for secure data communication in cyberspace 19. Transforming Network Protection Via Open Innovation Strategies 20. Emerging Role of Digital Library in Evaluating Copyright Regulations