Cyber Security Using Modern Technologies -Bookswagon
Home > General > Cyber Security Using Modern Technologies
Cyber Security Using Modern Technologies

Cyber Security Using Modern Technologies


     0     
5
4
3
2
1



Available


About the Book

The main objective of this book is to introduce cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures and Artificial Intelligence for cyber security of modern networks and it also covers various cyber-attacks and the defence measures, strategies and techniques that need to be followed to combat them, the book goes on to explore several crucial topics such as security of Advanced Metering Infrastructure in Smart Grids, key management protocols, Network Forensic, Intrusion Detection Using Machine Learning, Cloud computing security risk assessment model and framework, Cyber-Physical Energy Systems Security, Biometric Random Key Generator using Deep Neural Network and Encrypted Network Traffic Classification. Additionally, the book provides new techniques to handle the modern threats with more intelligence. It also includes some modern techniques for cyber security such as blockchain for modern security, quantum cryptography, forensic tools etc. Additionally, it provides a comprehensive survey of cutting-edge research on cybersecurity of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in the book thoroughly examine the constraints of network including computation, communication and storage cost constraints, etc and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, the book would prove extremely helpful to readers. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security.


About the Author:

Dr. Om Pal received B.E. in Computer Science & Engineering from Dr. B. R. Ambedkar University, Agra, MBA in Operation Management from IGNOU, MS (Research) in field of Cryptography from IIT Bombay and Ph.D. in field of Cryptographic Key Management from Jamia Millia Islamia, New Delhi. He has more than 19 years of Academic & Research experience in various areas of Computer Science. He is currently a Scientist-D at Ministry of Electronics and Information Technology, Government of India. He has evolved and worked on many research projects of national interest. Previously he worked at Centre for Development of Advanced Computing (C-DAC) as a Sr. Technical Officer and as an IT Resource Person in National Thermal Power Corporation (NTPC). He has published many research articles in International Journals (Transaction/SCI/Scopus) and International Conferences of repute. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He has delivered many talks on cyber security, Quantum Security and Blockchain Technology. His research interest includes Cryptography, Quantum Cryptography, Cyber Security, Blockchain Technology, Theoretical Computer Science and Cyber Laws.

Dr. Vinod Kumar is presently working as Assistant Professor with the department of Electronics and Communication (Computer Science and Engineering), University of Allahabad, Prayagraj, Uttar Pradesh, India. Before joining University of Allahabad, he worked as Assistant Professor in the Department of Computer Science and Engineering, Rajkiya Engineering College (REC) Kannauj, UP, India. Prior to this, he worked as Assistant Professor in the School of Information Technology, Centre for Development of Advanced Computing (C-DAC) Noida UP India. He has received MCA from Uttar Pradesh Technical University (UPTU) Lucknow UP, India in 2005, M.Tech in Computer Science and Engineering from Guru Gobind Singh Indraprastha University (GGSIPU) Delhi in 2011, and Ph.D. in field of Cryptographic from Jamia Millia Islamia (JMI), New Delhi. He has published various quality papers in the reputed International Journals like Elsevier, Springer, Wiley, etc. He has also presented various research papers in reputed International Conferences. He has written two books for undergraduate and postgraduate students of computer science and engineering. He has a rich academics & research experience in various areas of computer science. His research interest includes cryptographic protocols, Key management in multicasting/secure group communications, and authentication protocol and security in WSNs.

Dr. Rijwan Khan received his B.Tech Degree in Computer Science & Engineering from BIT, M.Tech in Computer Science & Engineering from IETE, and Ph.D.in Computer Engineering from Jamia Millia Islamia, New Delhi. He has 16 years of Academic & Research Experience in various areas of Computer Science. He is currently working as Professor and Head of Department Computer Science and Engineering at ABES Institute of Technology, Ghaziabad U.P. He is author of three subject books. He published more than 50 research papers in different journals and conferences. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He is the editor of three research books. He chaired three international conferences and was a keynote speaker in some national and international conferences.

Prof. Bashir Alam received his B.Tech.(Computer Engineering) from Aligarh Muslim University (A Central University of Government of India), Aligarh, Uttar Pradesh, India, M.Tech.(IT) from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D., from Jamia Millia Islamia (A Central University of Government of India), New Delhi, India. Currently he is a Professor & Head of the Department, Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi. He has published several research articles/ papers in various reputed International Journals and Conference Proceedings published by reputed publishers like Elsevier, Springer, IEEE etc. He has filed patents on Conditional Access System, Cryptographic systems. His research interests include Block chain Technology, Network Security, GPU Computing, Big Data, Parallel Computing, Soft Computing, Computer Network, Operating System, Distributed and Cloud Computing, Advanced Computer Architecture and Intellectual Property Rights. He is also reviewer for several reputed international journals and Conferences. He is a Life Time Member of ISTE (Indian Society for Technical Education) and other technical societies.

Prof. Mansaf Alam has been working as a Professor in the Department of Computer Science, Faculty of Natural Sciences, Jamia Millia Islamia, New Delhi-110025, Young Faculty Research Fellow, DeitY, Govt. of India & Editor-in-Chief, Journal of Applied Information Science. He has published several research articles in reputed International Journals and Proceedings at reputed International conferences published by IEEE, Springer, Elsevier Science, and ACM. His area of research includes Artificial Intelligence, Big Data Analytics, Machine Learning & Deep Learning, Cloud Computing, and Data Mining. He is a reviewer of various journals of International repute, like Information Science, published by Elsevier Science. He is also a member of the program committee of various reputed International conferences. He is on the Editorial Board of some reputed Intentional Journals in Computer Sciences. He has published three books: Digital Logic Design by PHI, Concepts of Multimedia by Arihant, and Internet of Things: Concepts and Applications by Springer, Big Data Analytics: Applications in Business and Marketing, Big Data Analytics: Digital Marketing and Decision Making by Taylor and Francis. He recently got International Patent (Australian) on An Artificial Intelligence Based Smart Dustbin.


Best Sellers



Product Details
  • ISBN-13: 9781032213194
  • Publisher: Taylor & Francis Ltd
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Artificial Intelligence, Blockchain and Quantum Cryptography
  • Width: 178 mm
  • ISBN-10: 1032213191
  • Publisher Date: 02 Aug 2023
  • Height: 254 mm
  • No of Pages: 304
  • Spine Width: 22 mm
  • Weight: 770 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber Security Using Modern Technologies
Taylor & Francis Ltd -
Cyber Security Using Modern Technologies
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber Security Using Modern Technologies

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!