Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cyber Security in India
  • Language: en
  • Pages: 114

Cyber Security in India

This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur's Computer Science and Engineering Department established an ‘Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)’ in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government...

Cyber Security Cryptography and Machine Learning
  • Language: en
  • Pages: 342

Cyber Security Cryptography and Machine Learning

  • Type: Book
  • -
  • Published: 2019-06-17
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Digital Forensics and Cyber Crime
  • Language: en
  • Pages: 488

Digital Forensics and Cyber Crime

This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022. The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.

Cyber Security of Industrial Control Systems in the Future Internet Environment
  • Language: en
  • Pages: 397

Cyber Security of Industrial Control Systems in the Future Internet Environment

  • Type: Book
  • -
  • Published: 2020-02-21
  • -
  • Publisher: IGI Global

In today’s modernized market, many fields are utilizing internet technologies in their everyday methods of operation. The industrial sector is no different as these technological solutions have provided several benefits including reduction of costs, scalability, and efficiency improvements. Despite this, cyber security remains a crucial risk factor in industrial control systems. The same public and corporate solutions do not apply to this specific district because these security issues are more complex and intensive. Research is needed that explores new risk assessment methods and security mechanisms that professionals can apply to their modern technological procedures. Cyber Security of I...

Computer Science Engineering
  • Language: en
  • Pages: 764

Computer Science Engineering

  • Type: Book
  • -
  • Published: 2024-12-20
  • -
  • Publisher: CRC Press

This book provides a comprehensive overview of the latest advancements and research in the fields of computing and intelligent information systems. It compiles cutting-edge studies, innovative methodologies, and practical applications presented at the conference ICCIIS 2024. The book delves into several core areas of modern computing and intelligent information systems. Key topics include artificial intelligence, exploring machine learning algorithms and neural networks; information systems and robotic process automation, highlighting efficient business process automation strategies; and signal, image, and video processing, focusing on innovative techniques for multimedia analysis. Big data ...

Advances in Cyber Security
  • Language: en
  • Pages: 746

Advances in Cyber Security

This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.

Security, Privacy, and Applied Cryptography Engineering
  • Language: en
  • Pages: 268

Security, Privacy, and Applied Cryptography Engineering

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Security, Privacy, and Applied Cryptography Engineering
  • Language: en
  • Pages: 246

Security, Privacy, and Applied Cryptography Engineering

This book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 24 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Cyber Security, Cryptology, and Machine Learning
  • Language: en
  • Pages: 539

Cyber Security, Cryptology, and Machine Learning

This book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, held in Be'er Sheva, Israel, in June 2023. The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Linear Programming for Project Management Professionals
  • Language: en
  • Pages: 270

Linear Programming for Project Management Professionals

Learn techniques of project scheduling using MS Excel and Solver. KEY FEATURES ● Covers methods to streamlining project completion and optimising budgets. ● Includes techniques for resolving business problems and optimising EVM. ● Examines project crashing strategies, linear programming solutions, and the Solver tool. DESCRIPTION This book assists project management professionals in resolving project crashing situations through linear programming. It demonstrates how the PM team can help streamline the project's on-time completion and cost optimization. The book begins with understanding project management processes and frameworks such as WBS, PDM, and EVM. The book helps build familia...