Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Handbook of Computer Networks and Cyber Security
  • Language: en
  • Pages: 957

Handbook of Computer Networks and Cyber Security

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of stori...

Handbook of Research on Intrusion Detection Systems
  • Language: en
  • Pages: 407

Handbook of Research on Intrusion Detection Systems

  • Type: Book
  • -
  • Published: 2020-02-07
  • -
  • Publisher: IGI Global

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Security, Privacy, and Forensics Issues in Big Data
  • Language: en
  • Pages: 474

Security, Privacy, and Forensics Issues in Big Data

  • Type: Book
  • -
  • Published: 2019-08-30
  • -
  • Publisher: IGI Global

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.

Advances in Malware and Data-Driven Network Security
  • Language: en
  • Pages: 304

Advances in Malware and Data-Driven Network Security

  • Type: Book
  • -
  • Published: 2021-11-12
  • -
  • Publisher: IGI Global

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware – to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security com...

Security and Privacy Preserving for IoT and 5G Networks
  • Language: en
  • Pages: 283

Security and Privacy Preserving for IoT and 5G Networks

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
  • Language: en
  • Pages: 336

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media

  • Type: Book
  • -
  • Published: 2021
  • -
  • Publisher: Unknown

"This book explores the key concepts of data mining and utilizing them on online social media platforms, offering valuable insight into data mining approaches for big data and sentiment analysis in online social media and covering many important security and other aspects and current trends"--

Challenges in Large Language Model Development and AI Ethics
  • Language: en
  • Pages: 521

Challenges in Large Language Model Development and AI Ethics

  • Type: Book
  • -
  • Published: 2024-08-15
  • -
  • Publisher: IGI Global

The development of large language models has resulted in artificial intelligence advancements promising transformations and benefits across various industries and sectors. However, this progress is not without its challenges. The scale and complexity of these models pose significant technical hurdles, including issues related to bias, transparency, and data privacy. As these models integrate into decision-making processes, ethical concerns about their societal impact, such as potential job displacement or harmful stereotype reinforcement, become more urgent. Addressing these challenges requires a collaborative effort from business owners, computer engineers, policymakers, and sociologists. F...

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing
  • Language: en

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing

  • Type: Book
  • -
  • Published: 2021
  • -
  • Publisher: CRC Press

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

Cloud Security
  • Language: en
  • Pages: 249

Cloud Security

  • Type: Book
  • -
  • Published: 2021
  • -
  • Publisher: Unknown

"Cloud Computing has proven itself as an extraordinary computing paradigm by providing rapidly deployable and scalable Information Technology (IT) solutions with reduced infrastructure costs. However, there are numerous challenges associated with this technology that require a complete understanding in order to be prevented. Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in Cloud Computing. It also provides valuable insights into the security and privacy aspects in Cloud"--

Internet of Things Security
  • Language: en
  • Pages: 94

Internet of Things Security

  • Type: Book
  • -
  • Published: 2020-03-10
  • -
  • Publisher: CRC Press

The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequat...