ISBN13: | 9781032802305 |
ISBN10: | 1032802308 |
Kötéstípus: | Keménykötés |
Terjedelem: | 306 oldal |
Méret: | 254x178 mm |
Nyelv: | angol |
Illusztrációk: | 127 Illustrations, black & white; 11 Halftones, black & white; 116 Line drawings, black & white; 54 Tables, black & white |
700 |
Adatkezelés a számítógépes rendszerekben
Hardver és operációs rendszerek általában
Számítógép architektúrák, logikai tervezés
Szoftverfejlesztés
Számítógépes hálózatok általában
Adatvédelem, adatbiztonság
Számítógépes bűnözés
A számítástechnika biztonsági és egészségügyi vonatkozásai
A számítógép és az információs technológia hatása a társadalomra
Büntető jog
Közgazdaságtan
Szolgáltatóipar
Az internetről általában
Kriminológia
Adatkezelés a számítógépes rendszerekben (karitatív célú kampány)
Hardver és operációs rendszerek általában (karitatív célú kampány)
Számítógép architektúrák, logikai tervezés (karitatív célú kampány)
Szoftverfejlesztés (karitatív célú kampány)
Számítógépes hálózatok általában (karitatív célú kampány)
Adatvédelem, adatbiztonság (karitatív célú kampány)
Számítógépes bűnözés (karitatív célú kampány)
A számítástechnika biztonsági és egészségügyi vonatkozásai (karitatív célú kampány)
A számítógép és az információs technológia hatása a társadalomra (karitatív célú kampány)
Büntető jog (karitatív célú kampány)
Közgazdaságtan (karitatív célú kampány)
Szolgáltatóipar (karitatív célú kampány)
Az internetről általában (karitatív célú kampány)
Kriminológia (karitatív célú kampány)
Securing the Digital Realm
GBP 110.00
Kattintson ide a feliratkozáshoz
This book "Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics" is a comprehensive guide that explores the intricate world of digital security and forensics.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics. As our lives become increasingly digital, understanding how to protect our digital assets, communication systems, and investigate cybercrimes is more crucial than ever. This book begins by laying a strong foundation in the fundamental concepts of hardware and software security. It explains the design of modern computer systems and networks to defend against a myriad of threats, from malware to data breaches, in clear and accessible language.
One of the standout features of this book is its coverage of cutting-edge technologies like blockchain, artificial intelligence, and machine learning. It demonstrates how these innovations are used to enhance digital security and combat evolving threats.
Key features of the book include:
- Comprehensive coverage of digital security, communication, and forensics
- Exploration of cutting-edge technologies and trends
- Emphasis on digital forensics techniques and tools
- Coverage of ethical and legal aspects of digital security
- Practical guidance for applying cybersecurity principles
Additionally, the book highlights the importance of secure communication in the digital age, discussing encryption, secure messaging protocols, and privacy-enhancing technologies. It empowers readers to make informed decisions about protecting their online communications. Written by experts in the field, this book addresses the ethical and legal dimensions of digital security and forensics, providing readers with a comprehensive understanding of these complex topics. This book is essential reading for anyone interested in understanding and navigating the complexities of digital security and forensics.
About the Editors. List of Contributors. 1.Performance analysis of PSK based advanced modulation formats for free space optical communication system. 2.Volatile Kernel Rootkit Hidden Process Detection View (VKRHPDV) Approach for Detection of Malware in Cloud Computing Environments. 3.Privacy preserved Federated Learning with Optimized Differential Privacy (FL-ODP). 4.Cyber Physical Systems having Nodes/Layers with Trustworthy Data: A Review. 5.Analysis of Device-To-Device Communication in IOT System. 6.Design and Implementation of an On-board System for a Spider Robot. 7.Revolutionizing Underwater Sensor Networks: A Novel Routing Approach for Efficient Data Collection with Atom-inspired Design. 8.Extending WSN Lifetime with Cluster Head Election. 9.A Parametric Analysis of Routing Protocols in Wireless Sensor Networks. 10.Implementation of IoT and WSN Technologies for Health Monitoring. 11.A Survey on Approximate Hardware Accelerator for Error-Tolerant Applications. 12.Virtual Memory Management Techniques. 13.A Comprehensive Survey on Software Defined Networking (SDN) Security. 14.Access Control Techniques for Cloud Computing: Review and Recommendations. 15.A Jurisprudence for Pakistan?s Digital Forensic Investigation Framework Regarding Cybersecurity. 16.LockPath: Logic Locking Technique based on Longest Path Constraint for Hardware Security. 17.A Review of the Various Methods of Communication Used in Ad Hoc Networks. 18.Authentication of User Data for enhancing privacy in Cloud Computing Using Security Algorithms. 19.Big Data Issues in Mobile Cloud Computing. 20.A Comprehensive Review on the Role of Blockchain in Reinforcing Security for Industrial IoT. 21.Design & Implementation Role of Middleware in Shared Network Environments: A Systematic Review. 22.Challenges & Frameworks in Cloud Security Governance: A Review. 23.LTE/Wi-Fi Coexistence in Unlicensed Band. 24.Evolution of Next-Generation Firewall System for Secure Networks. 25.Security and Performance Comparison of Window and Linux - A Systematic Literature Review.