0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 45 matches in All Departments

Handbook of Research on AI and ML for Intelligent Machines and Systems: Brij B. Gupta, Francesco Colace Handbook of Research on AI and ML for Intelligent Machines and Systems
Brij B. Gupta, Francesco Colace
R9,869 Discovery Miles 98 690 Ships in 12 - 17 working days
Sdn And Nfv: A New Dimension To Virtualization (Hardcover): Brij B. Gupta, Amrita Dahiya, Elhadj Benkhelifa Sdn And Nfv: A New Dimension To Virtualization (Hardcover)
Brij B. Gupta, Amrita Dahiya, Elhadj Benkhelifa
R2,484 Discovery Miles 24 840 Ships in 10 - 15 working days

Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutionized network management, particularly in highly distributed networks that are used in public, private, or hybrid cloud services. SDN and NFV technologies, when combined, simplify the deployment of network resources, lower capital and operating expenses, and offer greater network flexibility. The increasing usage of NFV is one of the primary factors that make SDN adoption attractive. The integration of these two technologies; SDN and NFV, offer a complementary service, with NFV delivering many of the real services controlled in an SDN. While SDN is focused on the control plane, NFV optimizes the actual network services that manage the data flows. Devices such as routers, firewalls, and VPN terminators are replaced with virtual devices that run on commodity hardware in NFV physical networking. This resembles the 'as-a-service' typical model of cloud services in many aspects. These virtual devices can be accessed on-demand by communication, network, or data center providers.This book illustrates the fundamentals and evolution of SDN and NFV and highlights how these two technologies can be integrated to solve traditional networking problems. In addition, it will focus on the utilization of SDN and NFV to enhance network security, which will open ways to integrate them with current technologies such as IoT, edge computing and blockchain, SDN-based network programmability, and current network orchestration technologies. The basics of SDN and NFV and associated issues, challenges, technological advancements along with advantages and risks of shifting networking paradigm towards SDN are also discussed. Detailed exercises within the book and corresponding solutions are available online as accompanying supplementary material.

Distributed Intelligent Circuits And Systems: Balwinder Baj, Brij B. Gupta, Shailendra Singh, Monirujjaman Khan Distributed Intelligent Circuits And Systems
Balwinder Baj, Brij B. Gupta, Shailendra Singh, Monirujjaman Khan
R3,929 Discovery Miles 39 290 Ships in 10 - 15 working days

The main objective of this book is to provide insights into recent advances in distributed intelligent circuits, systems and their applications. Distributed intelligence is the key enabler for innovations in machine-to-machine communications. The innovations are directed towards keeping existing algorithms as the base and developing new intelligent systems by employing smart technologies. Artificial intelligence (AI) and, more specifically, deep learning (DL) are receiving significant attention in assisting doctors in the detection of disease patterns without much human intervention. In agriculture, robots automate slow, repetitive and dull tasks, allowing farmers to focus more on improving overall production yields.The evolving trends point to the interface of artificial intelligence with machines being a factor in enhancing the decision-making capabilities of smart machines. This book provides relevant theoretical frameworks that include basic models, algorithms, circuit designs and the latest developments in experimental aspects in the field of distributed intelligence systems for industrial applications. The challenges encountered in the development of models for distributed intelligence systems for environmental monitoring are mitigated with artificial intelligence, machine learning and deep learning. This book identifies challenges and helps in applying solutions in the development of advanced intelligent systems for environmental monitoring.

Advances in Malware and Data-Driven Network Security (Hardcover): Brij B. Gupta Advances in Malware and Data-Driven Network Security (Hardcover)
Brij B. Gupta
R5,616 Discovery Miles 56 160 Ships in 12 - 17 working days

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover): Brij B. Gupta Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover)
Brij B. Gupta
R5,612 Discovery Miles 56 120 Ships in 12 - 17 working days

In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,692 Discovery Miles 76 920 Ships in 12 - 17 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Security, Privacy, and Forensics Issues in Big Data (Hardcover): Ramesh C. Joshi, Brij B. Gupta Security, Privacy, and Forensics Issues in Big Data (Hardcover)
Ramesh C. Joshi, Brij B. Gupta
R6,804 Discovery Miles 68 040 Ships in 12 - 17 working days

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,228 Discovery Miles 72 280 Ships in 12 - 17 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (Hardcover): Brij B. Gupta, Dragan Perakovic, Ahmed... Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (Hardcover)
Brij B. Gupta, Dragan Perakovic, Ahmed A. Abd El-Latif, Deepak Gupta
R6,512 Discovery Miles 65 120 Ships in 12 - 17 working days

Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms, and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Paperback):... Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Paperback)
Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal
R1,415 Discovery Miles 14 150 Ships in 12 - 17 working days

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.

Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications: Ahmed A. Abd El-Latif, Mohamed Hammad,... Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications
Ahmed A. Abd El-Latif, Mohamed Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk
R3,260 R2,858 Discovery Miles 28 580 Save R402 (12%) Ships in 10 - 15 working days

The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks. This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity. Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.

Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover): Balwinder Raj, Brij B. Gupta, Jeetendra... Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover)
Balwinder Raj, Brij B. Gupta, Jeetendra Singh
R2,815 Discovery Miles 28 150 Ships in 12 - 17 working days

Unique selling point: * Contains electronics device, Circuits, systems as well as applications of Integrated Circuits in healthcare and security never before considered Core audience: * Researchers and post graduates Place in the market: * Includes key new finding of electronic devices for Security Applications, and Integrated Circutis for healthcare and security Applications with advanced

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R634 Discovery Miles 6 340 Ships in 12 - 17 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Big Data Management And Analytics (Hardcover): Brij B. Gupta, Mamta Big Data Management And Analytics (Hardcover)
Brij B. Gupta, Mamta
R2,249 Discovery Miles 22 490 Ships in 10 - 15 working days

With the proliferation of information, big data management and analysis have become an indispensable part of any system to handle such amounts of data. The amount of data generated by the multitude of interconnected devices increases exponentially, making the storage and processing of these data a real challenge.Big data management and analytics have gained momentum in almost every industry, ranging from finance or healthcare. Big data can reveal key insights if handled and analyzed properly; it has great application potential to improve the working of any industry. This book covers the spectrum aspects of big data; from the preliminary level to specific case studies. It will help readers gain knowledge of the big data landscape.Highlights of the topics covered include description of the Big Data ecosystem; real-world instances of big data issues; how the Vs of Big Data (volume, velocity, variety, veracity, valence, and value) affect data collection, monitoring, storage, analysis, and reporting; structural process to get value out of Big Data and recognize the differences between a standard database management system and a big data management system.Readers will gain insights into choice of data models, data extraction, data integration to solve large data problems, data modelling using machine learning techniques, Spark's scalable machine learning techniques, modeling a big data problem into a graph database and performing scalable analytical operations over the graph and different tools and techniques for processing big data and its applications including in healthcare and finance.

Handbook of Research on Digitalization Solutions for Social and Economic Needs (Hardcover): Richard Pettinger, Brij B. Gupta,... Handbook of Research on Digitalization Solutions for Social and Economic Needs (Hardcover)
Richard Pettinger, Brij B. Gupta, Alexandru Roja, Diana Cozmiuc
R9,869 Discovery Miles 98 690 Ships in 12 - 17 working days

Digital solutions are sufficiently versatile and agile to shape business processes and enterprise architecture, answer the COVID-19 crisis, solve climate change, temper political conflict, generate new employment operating models, and solve health issues. These solutions benefit businesses as an integral part of the economy and society and therefore must be studied further to ensure they are utilized appropriately. The Handbook of Research on Digitalization Solutions for Social and Economic Needs introduces the agile operating model that has triggered digital transformation and the plethora of ways it has become of practical use recently. The book also argues the business rationale of digitalization. Covering key topics such as innovation, sustainability, and business transformation, this major reference work is ideal for business owners, managers, computer scientists, industry professionals, researchers, scholars, academicians, librarians, policymakers, practitioners, educators, and students.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,180 Discovery Miles 31 800 Ships in 12 - 17 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Hardcover):... Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Hardcover)
Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal
R3,717 R2,174 Discovery Miles 21 740 Save R1,543 (42%) Ships in 9 - 15 working days

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.

Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover): Govind P. Gupta,... Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover)
Govind P. Gupta, Rakesh Tripathi, Brij B. Gupta, Kwok Tai Chui
R2,907 Discovery Miles 29 070 Ships in 12 - 17 working days

Focuses on the latest development in Big IoT Data Analytics Presents different issues of Security and Privacy Analytics for Fog-enabled IoT system Offers the latest Big Data Technologies for security analytics in Fog-enabled IoT Network Discusses the emerging role of Big Data Analytics and Technologies in detection of Cyberattacks in IoT networks Presents the prospects on Big IoT Data Analytics in Fog-enabled IoT system

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R2,899 Discovery Miles 28 990 Ships in 12 - 17 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Paperback): Brij B. Gupta,... Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Paperback)
Brij B. Gupta, Nadia Nedjah
R1,192 Discovery Miles 11 920 Ships in 12 - 17 working days

With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evolution of robotic systems, as well as industrial statistics and future forecasts. First, it analyzes the safety-related parameters of these systems. Then, it covers security attacks and related countermeasures, and how to establish reliability in these systems. The later sections of the book then discuss various applications of these systems in modern industrial and domestic settings. By the end of this book, you will be familiarized with the theoretical frameworks, algorithms, applications, technologies, and empirical research findings on the safety, security, and reliability of robotic systems, while the book's modular structure and comprehensive material will keep you interested and involved throughout. This book is an essential resource for students, professionals, and entrepreneurs who wish to understand the safe, secure, and reliable use of robotics in real-world applications. It is edited by two specialists in the field, with chapter contributions from an array of experts on robotics systems and applications.

Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Hardcover, 1st ed. 2022): Nadia Nedjah, Ahmed A.... Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Hardcover, 1st ed. 2022)
Nadia Nedjah, Ahmed A. Abd El-Latif, Brij B. Gupta, Luiza M. Mourelle
R4,266 Discovery Miles 42 660 Ships in 12 - 17 working days

This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologies have made significant strides, there is increased interest in combining the two domains in order to create a new integrated AI and robotics trend. In order to achieve wiser urbanization and more sustainable development, AI in smart cities will play a significant part in equipping the cities with advanced features that will allow residents to safely move about, stroll, shop, and enjoy a more comfortable way of life. If you are a student, researcher, engineer, or professional working in this field, or if you are just curious in the newest advancements in robotics and artificial intelligence for cybersecurity, this book is for you!

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R571 Discovery Miles 5 710 Ships in 12 - 17 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Handbook of Research on Multimedia Cyber Security (Hardcover): Brij B. Gupta, Deepak Gupta Handbook of Research on Multimedia Cyber Security (Hardcover)
Brij B. Gupta, Deepak Gupta
R7,709 Discovery Miles 77 090 Ships in 12 - 17 working days

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022):... Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022)
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta
R4,269 Discovery Miles 42 690 Ships in 12 - 17 working days

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Cloud Security - Concepts, Applications and Perspectives (Hardcover): Brij B. Gupta Cloud Security - Concepts, Applications and Perspectives (Hardcover)
Brij B. Gupta
R5,016 Discovery Miles 50 160 Ships in 12 - 17 working days

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Boucheron Boucheron Eau De Parfum Spray…
R3,444 R1,046 Discovery Miles 10 460
The Garden Within - Where the War with…
Anita Phillips Paperback R329 R239 Discovery Miles 2 390
Everlotus CD DVD wallet, 72 discs
 (1)
R129 R99 Discovery Miles 990
The Papery A5 MOM 2025 Diary - Dragonfly
R349 R300 Discovery Miles 3 000
Professor Snape Wizard Wand - In…
 (8)
R801 Discovery Miles 8 010
LG 20MK400H 19.5" Monitor WXGA LED Black
R2,199 R1,559 Discovery Miles 15 590
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570
By Way Of Deception
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R185 Discovery Miles 1 850
Knock At The Cabin
Dave Bautista, Jonathan Groff, … DVD R133 Discovery Miles 1 330

 

Partners